Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe

Overview

General Information

Sample name:17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe
Analysis ID:1561337
MD5:c69539e84cc2b3332174b6bbfb5e35e7
SHA1:db1cec011bab82fdde6e087335908f65ad6a32df
SHA256:ff7715c495b9b34a10f9cb7653b09525a194791449c055a1af94e36834b0116a
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Installs a global keyboard hook
Machine Learning detection for sample
Uses dynamic DNS services
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["shilajat.duckdns.org:2405:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "iphone-SP6UL4", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "back.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "chiqui"}
SourceRuleDescriptionAuthorStrings
17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
      17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aab8:$a1: Remcos restarted by watchdog!
        • 0x6b030:$a3: %02i:%02i:%02i:%03i
        17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeREMCOS_RAT_variantsunknownunknown
        • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64b7c:$str_b2: Executing file:
        • 0x65bfc:$str_b3: GetDirectListeningPort
        • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65728:$str_b7: \update.vbs
        • 0x64ba4:$str_b9: Downloaded file:
        • 0x64b90:$str_b10: Downloading file:
        • 0x64c34:$str_b12: Failed to upload file:
        • 0x65bc4:$str_b13: StartForward
        • 0x65be4:$str_b14: StopForward
        • 0x65680:$str_b15: fso.DeleteFile "
        • 0x65614:$str_b16: On Error Resume Next
        • 0x656b0:$str_b17: fso.DeleteFolder "
        • 0x64c24:$str_b18: Uploaded file:
        • 0x64be4:$str_b19: Unable to delete:
        • 0x65648:$str_b20: while fso.FileExists("
        • 0x650c1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x134b8:$a1: Remcos restarted by watchdog!
              • 0x13a30:$a3: %02i:%02i:%02i:%03i
              00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                Click to see the 8 entries
                SourceRuleDescriptionAuthorStrings
                0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                    0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                      • 0x6aab8:$a1: Remcos restarted by watchdog!
                      • 0x6b030:$a3: %02i:%02i:%02i:%03i
                      0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                      • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
                      • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                      • 0x64b7c:$str_b2: Executing file:
                      • 0x65bfc:$str_b3: GetDirectListeningPort
                      • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                      • 0x65728:$str_b7: \update.vbs
                      • 0x64ba4:$str_b9: Downloaded file:
                      • 0x64b90:$str_b10: Downloading file:
                      • 0x64c34:$str_b12: Failed to upload file:
                      • 0x65bc4:$str_b13: StartForward
                      • 0x65be4:$str_b14: StopForward
                      • 0x65680:$str_b15: fso.DeleteFile "
                      • 0x65614:$str_b16: On Error Resume Next
                      • 0x656b0:$str_b17: fso.DeleteFolder "
                      • 0x64c24:$str_b18: Uploaded file:
                      • 0x64be4:$str_b19: Unable to delete:
                      • 0x65648:$str_b20: while fso.FileExists("
                      • 0x650c1:$str_c0: [Firefox StoredLogins not found]
                      Click to see the 7 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-23T06:53:30.564688+010020365941Malware Command and Control Activity Detected192.168.2.549726154.216.17.2042405TCP
                      2024-11-23T06:53:33.921719+010020365941Malware Command and Control Activity Detected192.168.2.549737154.216.17.2042405TCP
                      2024-11-23T06:53:37.311810+010020365941Malware Command and Control Activity Detected192.168.2.549750154.216.17.2042405TCP
                      2024-11-23T06:53:40.697560+010020365941Malware Command and Control Activity Detected192.168.2.549757154.216.17.2042405TCP
                      2024-11-23T06:53:44.047747+010020365941Malware Command and Control Activity Detected192.168.2.549768154.216.17.2042405TCP
                      2024-11-23T06:53:47.495661+010020365941Malware Command and Control Activity Detected192.168.2.549775154.216.17.2042405TCP
                      2024-11-23T06:53:50.911072+010020365941Malware Command and Control Activity Detected192.168.2.549786154.216.17.2042405TCP
                      2024-11-23T06:53:54.283398+010020365941Malware Command and Control Activity Detected192.168.2.549793154.216.17.2042405TCP
                      2024-11-23T06:53:57.683528+010020365941Malware Command and Control Activity Detected192.168.2.549805154.216.17.2042405TCP
                      2024-11-23T06:54:01.121314+010020365941Malware Command and Control Activity Detected192.168.2.549811154.216.17.2042405TCP
                      2024-11-23T06:54:04.543063+010020365941Malware Command and Control Activity Detected192.168.2.549821154.216.17.2042405TCP
                      2024-11-23T06:54:07.933369+010020365941Malware Command and Control Activity Detected192.168.2.549829154.216.17.2042405TCP
                      2024-11-23T06:54:11.329692+010020365941Malware Command and Control Activity Detected192.168.2.549839154.216.17.2042405TCP
                      2024-11-23T06:54:14.672259+010020365941Malware Command and Control Activity Detected192.168.2.549846154.216.17.2042405TCP
                      2024-11-23T06:54:18.103862+010020365941Malware Command and Control Activity Detected192.168.2.549856154.216.17.2042405TCP
                      2024-11-23T06:54:21.532976+010020365941Malware Command and Control Activity Detected192.168.2.549863154.216.17.2042405TCP
                      2024-11-23T06:54:24.932881+010020365941Malware Command and Control Activity Detected192.168.2.549874154.216.17.2042405TCP
                      2024-11-23T06:54:28.369691+010020365941Malware Command and Control Activity Detected192.168.2.549883154.216.17.2042405TCP
                      2024-11-23T06:54:32.080002+010020365941Malware Command and Control Activity Detected192.168.2.549894154.216.17.2042405TCP
                      2024-11-23T06:54:35.480636+010020365941Malware Command and Control Activity Detected192.168.2.549902154.216.17.2042405TCP
                      2024-11-23T06:54:38.846457+010020365941Malware Command and Control Activity Detected192.168.2.549911154.216.17.2042405TCP
                      2024-11-23T06:54:42.204358+010020365941Malware Command and Control Activity Detected192.168.2.549920154.216.17.2042405TCP
                      2024-11-23T06:54:45.636837+010020365941Malware Command and Control Activity Detected192.168.2.549928154.216.17.2042405TCP
                      2024-11-23T06:54:49.002216+010020365941Malware Command and Control Activity Detected192.168.2.549937154.216.17.2042405TCP
                      2024-11-23T06:54:52.449307+010020365941Malware Command and Control Activity Detected192.168.2.549946154.216.17.2042405TCP
                      2024-11-23T06:54:55.949127+010020365941Malware Command and Control Activity Detected192.168.2.549956154.216.17.2042405TCP
                      2024-11-23T06:54:59.314972+010020365941Malware Command and Control Activity Detected192.168.2.549963154.216.17.2042405TCP
                      2024-11-23T06:55:02.746917+010020365941Malware Command and Control Activity Detected192.168.2.549974154.216.17.2042405TCP
                      2024-11-23T06:55:06.137825+010020365941Malware Command and Control Activity Detected192.168.2.549981154.216.17.2042405TCP
                      2024-11-23T06:55:09.502721+010020365941Malware Command and Control Activity Detected192.168.2.549991154.216.17.2042405TCP
                      2024-11-23T06:55:12.943149+010020365941Malware Command and Control Activity Detected192.168.2.549998154.216.17.2042405TCP
                      2024-11-23T06:55:16.332004+010020365941Malware Command and Control Activity Detected192.168.2.550008154.216.17.2042405TCP
                      2024-11-23T06:55:19.723234+010020365941Malware Command and Control Activity Detected192.168.2.550015154.216.17.2042405TCP
                      2024-11-23T06:55:23.136212+010020365941Malware Command and Control Activity Detected192.168.2.550025154.216.17.2042405TCP
                      2024-11-23T06:55:26.488377+010020365941Malware Command and Control Activity Detected192.168.2.550032154.216.17.2042405TCP
                      2024-11-23T06:55:29.829081+010020365941Malware Command and Control Activity Detected192.168.2.550033154.216.17.2042405TCP
                      2024-11-23T06:55:33.425143+010020365941Malware Command and Control Activity Detected192.168.2.550034154.216.17.2042405TCP
                      2024-11-23T06:55:36.643997+010020365941Malware Command and Control Activity Detected192.168.2.550035154.216.17.2042405TCP
                      2024-11-23T06:55:39.899365+010020365941Malware Command and Control Activity Detected192.168.2.550036154.216.17.2042405TCP
                      2024-11-23T06:55:43.107206+010020365941Malware Command and Control Activity Detected192.168.2.550037154.216.17.2042405TCP
                      2024-11-23T06:55:46.301201+010020365941Malware Command and Control Activity Detected192.168.2.550038154.216.17.2042405TCP
                      2024-11-23T06:55:49.418902+010020365941Malware Command and Control Activity Detected192.168.2.550039154.216.17.2042405TCP
                      2024-11-23T06:55:52.487764+010020365941Malware Command and Control Activity Detected192.168.2.550040154.216.17.2042405TCP
                      2024-11-23T06:55:55.595275+010020365941Malware Command and Control Activity Detected192.168.2.550042154.216.17.2042405TCP
                      2024-11-23T06:55:58.685858+010020365941Malware Command and Control Activity Detected192.168.2.550043154.216.17.2042405TCP
                      2024-11-23T06:56:01.762109+010020365941Malware Command and Control Activity Detected192.168.2.550044154.216.17.2042405TCP
                      2024-11-23T06:56:04.811170+010020365941Malware Command and Control Activity Detected192.168.2.550045154.216.17.2042405TCP
                      2024-11-23T06:56:07.797224+010020365941Malware Command and Control Activity Detected192.168.2.550046154.216.17.2042405TCP
                      2024-11-23T06:56:10.736638+010020365941Malware Command and Control Activity Detected192.168.2.550047154.216.17.2042405TCP
                      2024-11-23T06:56:13.692388+010020365941Malware Command and Control Activity Detected192.168.2.550048154.216.17.2042405TCP
                      2024-11-23T06:56:16.675593+010020365941Malware Command and Control Activity Detected192.168.2.550049154.216.17.2042405TCP
                      2024-11-23T06:56:19.654928+010020365941Malware Command and Control Activity Detected192.168.2.550050154.216.17.2042405TCP
                      2024-11-23T06:56:22.544965+010020365941Malware Command and Control Activity Detected192.168.2.550051154.216.17.2042405TCP
                      2024-11-23T06:56:25.441728+010020365941Malware Command and Control Activity Detected192.168.2.550052154.216.17.2042405TCP
                      2024-11-23T06:56:28.253231+010020365941Malware Command and Control Activity Detected192.168.2.550053154.216.17.2042405TCP
                      2024-11-23T06:56:31.137762+010020365941Malware Command and Control Activity Detected192.168.2.550054154.216.17.2042405TCP
                      2024-11-23T06:56:34.358810+010020365941Malware Command and Control Activity Detected192.168.2.550055154.216.17.2042405TCP
                      2024-11-23T06:56:37.216308+010020365941Malware Command and Control Activity Detected192.168.2.550056154.216.17.2042405TCP
                      2024-11-23T06:56:40.077532+010020365941Malware Command and Control Activity Detected192.168.2.550057154.216.17.2042405TCP
                      2024-11-23T06:56:42.921056+010020365941Malware Command and Control Activity Detected192.168.2.550058154.216.17.2042405TCP
                      2024-11-23T06:56:45.709296+010020365941Malware Command and Control Activity Detected192.168.2.550060154.216.17.2042405TCP
                      2024-11-23T06:56:48.426392+010020365941Malware Command and Control Activity Detected192.168.2.550061154.216.17.2042405TCP
                      2024-11-23T06:56:51.217298+010020365941Malware Command and Control Activity Detected192.168.2.550062154.216.17.2042405TCP
                      2024-11-23T06:56:53.971335+010020365941Malware Command and Control Activity Detected192.168.2.550063154.216.17.2042405TCP
                      2024-11-23T06:56:56.709350+010020365941Malware Command and Control Activity Detected192.168.2.550064154.216.17.2042405TCP
                      2024-11-23T06:56:59.425295+010020365941Malware Command and Control Activity Detected192.168.2.550065154.216.17.2042405TCP
                      2024-11-23T06:57:02.129798+010020365941Malware Command and Control Activity Detected192.168.2.550066154.216.17.2042405TCP
                      2024-11-23T06:57:04.818605+010020365941Malware Command and Control Activity Detected192.168.2.550068154.216.17.2042405TCP
                      2024-11-23T06:57:07.498038+010020365941Malware Command and Control Activity Detected192.168.2.550069154.216.17.2042405TCP
                      2024-11-23T06:57:10.170399+010020365941Malware Command and Control Activity Detected192.168.2.550070154.216.17.2042405TCP
                      2024-11-23T06:57:12.851427+010020365941Malware Command and Control Activity Detected192.168.2.550071154.216.17.2042405TCP
                      2024-11-23T06:57:15.530292+010020365941Malware Command and Control Activity Detected192.168.2.550072154.216.17.2042405TCP
                      2024-11-23T06:57:18.189391+010020365941Malware Command and Control Activity Detected192.168.2.550073154.216.17.2042405TCP
                      2024-11-23T06:57:20.818781+010020365941Malware Command and Control Activity Detected192.168.2.550074154.216.17.2042405TCP
                      2024-11-23T06:57:23.443823+010020365941Malware Command and Control Activity Detected192.168.2.550075154.216.17.2042405TCP
                      2024-11-23T06:57:26.068180+010020365941Malware Command and Control Activity Detected192.168.2.550076154.216.17.2042405TCP
                      2024-11-23T06:57:28.750111+010020365941Malware Command and Control Activity Detected192.168.2.550077154.216.17.2042405TCP
                      2024-11-23T06:57:31.333893+010020365941Malware Command and Control Activity Detected192.168.2.550078154.216.17.2042405TCP
                      2024-11-23T06:57:34.264494+010020365941Malware Command and Control Activity Detected192.168.2.550079154.216.17.2042405TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeAvira: detected
                      Source: shilajat.duckdns.orgAvira URL Cloud: Label: malware
                      Source: 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["shilajat.duckdns.org:2405:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "iphone-SP6UL4", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "back.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "chiqui"}
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeVirustotal: Detection: 82%Perma Link
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeReversingLabs: Detection: 86%
                      Source: Yara matchFile source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe PID: 3168, type: MEMORYSTR
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_004338C8
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_f2917827-7

                      Exploits

                      barindex
                      Source: Yara matchFile source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe PID: 3168, type: MEMORYSTR

                      Privilege Escalation

                      barindex
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00407538 _wcslen,CoGetObject,0_2_00407538
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0044E8F9 FindFirstFileExA,0_2_0044E8F9
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49750 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49726 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49811 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49737 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49757 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49768 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49786 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49829 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49821 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49793 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49839 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49856 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49775 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49874 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49846 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49863 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49805 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49894 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49902 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49928 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49946 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49937 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49920 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49956 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49963 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49981 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49991 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50008 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50036 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50040 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50045 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50047 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50057 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50061 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50050 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50054 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50042 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50043 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49883 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50033 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50058 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49911 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50056 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50046 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50060 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50049 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50063 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50064 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50055 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50035 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50037 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50044 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50052 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50062 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50051 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50053 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49974 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49998 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50015 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50034 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50038 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50039 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50025 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50032 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50048 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50068 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50070 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50074 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50066 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50065 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50077 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50073 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50079 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50072 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50076 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50069 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50078 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50075 -> 154.216.17.204:2405
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:50071 -> 154.216.17.204:2405
                      Source: Malware configuration extractorURLs: shilajat.duckdns.org
                      Source: unknownDNS query: name: shilajat.duckdns.org
                      Source: global trafficTCP traffic: 192.168.2.5:49726 -> 154.216.17.204:2405
                      Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00426D42 recv,0_2_00426D42
                      Source: global trafficDNS traffic detected: DNS query: shilajat.duckdns.org
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp/C

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000000_2_0040A2F3
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004168FC
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,0_2_0040A41B
                      Source: Yara matchFile source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe PID: 3168, type: MEMORYSTR

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe PID: 3168, type: MEMORYSTR

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041CA73 SystemParametersInfoW,0_2_0041CA73

                      System Summary

                      barindex
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe PID: 3168, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,0_2_0041330D
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,0_2_0041BBC6
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,0_2_0041BB9A
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_004167EF
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0043706A0_2_0043706A
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004140050_2_00414005
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0043E11C0_2_0043E11C
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004541D90_2_004541D9
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004381E80_2_004381E8
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041F18B0_2_0041F18B
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004462700_2_00446270
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0043E34B0_2_0043E34B
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004533AB0_2_004533AB
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0042742E0_2_0042742E
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004375660_2_00437566
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0043E5A80_2_0043E5A8
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004387F00_2_004387F0
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0043797E0_2_0043797E
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004339D70_2_004339D7
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0044DA490_2_0044DA49
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00427AD70_2_00427AD7
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041DBF30_2_0041DBF3
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00427C400_2_00427C40
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00437DB30_2_00437DB3
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00435EEB0_2_00435EEB
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0043DEED0_2_0043DEED
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00426E9F0_2_00426E9F
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: String function: 00402093 appears 50 times
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: String function: 00401E65 appears 35 times
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: String function: 00434E70 appears 54 times
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: String function: 00434801 appears 42 times
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe PID: 3168, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@1/1@5/1
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_0041798D
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0040F4AF
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_0041B539
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\iphone-SP6UL4
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: Software\0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: iphone-SP6UL40_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: Exe0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: Exe0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: iphone-SP6UL40_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: ,aF0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: Inj0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: Inj0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: 8SG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: exepath0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: ,aF0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: 8SG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: exepath0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: licence0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: dMG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: PSG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: Administrator0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: User0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: del0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: del0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCommand line argument: del0_2_0040EA00
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeVirustotal: Detection: 82%
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeReversingLabs: Detection: 86%
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00457186 push ecx; ret 0_2_00457199
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00457AA8 push eax; ret 0_2_00457AC6
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00434EB6 push ecx; ret 0_2_00434EC9
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00406EEB ShellExecuteW,URLDownloadToFileW,0_2_00406EEB
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040F7E2 Sleep,ExitProcess,0_2_0040F7E2
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_0041A7D9
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeWindow / User API: threadDelayed 9220Jump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeWindow / User API: foregroundWindowGot 1773Jump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe TID: 4324Thread sleep count: 239 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe TID: 4324Thread sleep time: -119500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe TID: 5780Thread sleep count: 255 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe TID: 5780Thread sleep time: -765000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe TID: 5780Thread sleep count: 9220 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe TID: 5780Thread sleep time: -27660000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0044E8F9 FindFirstFileExA,0_2_0044E8F9
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeAPI call chain: ExitProcess graph end nodegraph_0-48688
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00443355 mov eax, dword ptr fs:[00000030h]0_2_00443355
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_004120B2 GetProcessHeap,HeapFree,0_2_004120B2
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043503C
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043BB71
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00434BD8 SetUnhandledExceptionFilter,0_2_00434BD8
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00412132
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00419662 mouse_event,0_2_00419662
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager(
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager&
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager/
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerm
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerP6UL4\
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager=
                      Source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00434CB6 cpuid 0_2_00434CB6
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_0045201B
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_004520B6
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00452143
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: GetLocaleInfoW,0_2_00452393
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00448484
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004524BC
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: GetLocaleInfoW,0_2_004525C3
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00452690
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: GetLocaleInfoW,0_2_0044896D
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: GetLocaleInfoA,0_2_0040F90C
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00451D58
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00451FD0
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00404F51 GetLocalTime,CreateEventA,CreateThread,0_2_00404F51
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_0041B69E GetComputerNameExW,GetUserNameW,0_2_0041B69E
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: 0_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00449210
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe PID: 3168, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040BA4D
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040BB6B
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: \key3.db0_2_0040BB6B

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe PID: 3168, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exeCode function: cmd.exe0_2_0040569A
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      11
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts12
                      Command and Scripting Interpreter
                      1
                      Windows Service
                      1
                      Bypass User Account Control
                      2
                      Obfuscated Files or Information
                      211
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol211
                      Input Capture
                      2
                      Encrypted Channel
                      Exfiltration Over Bluetooth1
                      Defacement
                      Email AddressesDNS ServerDomain Accounts2
                      Service Execution
                      Logon Script (Windows)1
                      Access Token Manipulation
                      1
                      DLL Side-Loading
                      2
                      Credentials In Files
                      1
                      System Service Discovery
                      SMB/Windows Admin Shares3
                      Clipboard Data
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      Windows Service
                      1
                      Bypass User Account Control
                      NTDS2
                      File and Directory Discovery
                      Distributed Component Object ModelInput Capture1
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                      Process Injection
                      1
                      Virtualization/Sandbox Evasion
                      LSA Secrets23
                      System Information Discovery
                      SSHKeylogging21
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Access Token Manipulation
                      Cached Domain Credentials21
                      Security Software Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                      Process Injection
                      DCSync1
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe82%VirustotalBrowse
                      17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe87%ReversingLabsWin32.Backdoor.Remcos
                      17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe100%AviraBDS/Backdoor.Gen
                      17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      shilajat.duckdns.org0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      shilajat.duckdns.org100%Avira URL Cloudmalware
                      shilajat.duckdns.org0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      shilajat.duckdns.org
                      154.216.17.204
                      truetrueunknown
                      s-part-0035.t-0009.t-msedge.net
                      13.107.246.63
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        shilajat.duckdns.orgtrue
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gp17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exefalse
                          high
                          http://geoplugin.net/json.gp/C17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exefalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            154.216.17.204
                            shilajat.duckdns.orgSeychelles
                            135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1561337
                            Start date and time:2024-11-23 06:52:10 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 50s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:4
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@1/1@5/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 32
                            • Number of non-executed functions: 220
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240s for sample files taking high CPU consumption
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            00:53:59API Interceptor6876675x Sleep call for process: 17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            154.216.17.2041732341065aa3050236bf0a757080986a42d53699fd38d78c31f65f12b4934c9236ce70a12688.dat-decoded.exeGet hashmaliciousXenoRATBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              s-part-0035.t-0009.t-msedge.netfile.exeGet hashmaliciousLummaC StealerBrowse
                              • 13.107.246.63
                              file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                              • 13.107.246.63
                              file.exeGet hashmaliciousLummaC StealerBrowse
                              • 13.107.246.63
                              file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                              • 13.107.246.63
                              file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                              • 13.107.246.63
                              file.exeGet hashmaliciousLummaC StealerBrowse
                              • 13.107.246.63
                              Yssr_Receipt.htmlGet hashmaliciousUnknownBrowse
                              • 13.107.246.63
                              file.exeGet hashmaliciousLummaC StealerBrowse
                              • 13.107.246.63
                              file.exeGet hashmaliciousLummaC StealerBrowse
                              • 13.107.246.63
                              file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                              • 13.107.246.63
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SKHT-ASShenzhenKatherineHengTechnologyInformationCo1732341065aa3050236bf0a757080986a42d53699fd38d78c31f65f12b4934c9236ce70a12688.dat-decoded.exeGet hashmaliciousXenoRATBrowse
                              • 154.216.17.204
                              test1.elfGet hashmaliciousMiraiBrowse
                              • 154.216.16.109
                              https://clearview-ps.inwise.net/Page_11-21-2024_1Get hashmaliciousHTMLPhisherBrowse
                              • 154.216.17.193
                              m68k.nn.elfGet hashmaliciousMirai, OkiruBrowse
                              • 154.216.19.139
                              018292540-LetterReguranPPI-20230814215304.PDF.exeGet hashmaliciousRemcosBrowse
                              • 154.216.20.185
                              800399031-18.11.2024.pdf.exeGet hashmaliciousRemcosBrowse
                              • 154.216.20.185
                              vkjqpc.elfGet hashmaliciousMiraiBrowse
                              • 154.216.16.109
                              vsbeps.elfGet hashmaliciousMiraiBrowse
                              • 154.216.16.109
                              wnbw86.elfGet hashmaliciousMiraiBrowse
                              • 154.216.16.109
                              qkehusl.elfGet hashmaliciousMiraiBrowse
                              • 154.216.16.109
                              No context
                              No context
                              Process:C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):144
                              Entropy (8bit):6.740935852061649
                              Encrypted:false
                              SSDEEP:3:waKIiGN7UnEnS5345Uu9wdsTB2qaVD1uF3o0560lpDyUXFxb:wPuN7UnES5oVTep1Wj5flpbb
                              MD5:E161F031E44135AE2BA8CD2D81DAC0DE
                              SHA1:406BAE2D73DABA7290126DDA1700001F5C757F61
                              SHA-256:3C69CEDFE3BED59E635E0D64ADE56891FDC76C967FB017F0BA3C8E3626B9C573
                              SHA-512:1B70C689D930F5266C27A5E208DC58A637BA67C5CEAA9ABFA58A3046036E942FD20019EA0EAAAEA8F6B5DBDE37E083E2703AA41E5B05D6A93E3B91BF5BF8D758
                              Malicious:false
                              Reputation:low
                              Preview:|Js'..G..Ic8-Gc(^1;..T.W2...0. ........@..p..>..R..1...B...].!".....6U...w../.p&.a..<-`.K.foC...c..=*.q..F'.$...Q.)i..;-.'......y.5.`p....
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.6016059668151605
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe
                              File size:494'592 bytes
                              MD5:c69539e84cc2b3332174b6bbfb5e35e7
                              SHA1:db1cec011bab82fdde6e087335908f65ad6a32df
                              SHA256:ff7715c495b9b34a10f9cb7653b09525a194791449c055a1af94e36834b0116a
                              SHA512:dfb8e29a68ad4be21d40eb63002f4e9468214c4098c334d676954c368e430e3af0c78cc7461922b1ccb1d7126dcac8f5cd5cc8dbf34beddf5c6004cb579907cb
                              SSDEEP:6144:4Tz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZXAXkcrqT4:4TlrYw1RUh3NFn+N5WfIQIjbs/ZXVT4
                              TLSH:F0B49E01BAD1C072D97514300D3AF776EAB8BD201835497B73EA1D5BFE31190A72AAB7
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~...~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..
                              Icon Hash:95694d05214c1b33
                              Entrypoint:0x434a80
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:TERMINAL_SERVER_AWARE
                              Time Stamp:0x66F18049 [Mon Sep 23 14:50:49 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:1
                              File Version Major:5
                              File Version Minor:1
                              Subsystem Version Major:5
                              Subsystem Version Minor:1
                              Import Hash:1389569a3a39186f3eb453b501cfe688
                              Instruction
                              call 00007F64FCBB1E8Bh
                              jmp 00007F64FCBB18D3h
                              push ebp
                              mov ebp, esp
                              sub esp, 00000324h
                              push ebx
                              push esi
                              push 00000017h
                              call 00007F64FCBD4123h
                              test eax, eax
                              je 00007F64FCBB1A47h
                              mov ecx, dword ptr [ebp+08h]
                              int 29h
                              xor esi, esi
                              lea eax, dword ptr [ebp-00000324h]
                              push 000002CCh
                              push esi
                              push eax
                              mov dword ptr [00471D14h], esi
                              call 00007F64FCBB3E96h
                              add esp, 0Ch
                              mov dword ptr [ebp-00000274h], eax
                              mov dword ptr [ebp-00000278h], ecx
                              mov dword ptr [ebp-0000027Ch], edx
                              mov dword ptr [ebp-00000280h], ebx
                              mov dword ptr [ebp-00000284h], esi
                              mov dword ptr [ebp-00000288h], edi
                              mov word ptr [ebp-0000025Ch], ss
                              mov word ptr [ebp-00000268h], cs
                              mov word ptr [ebp-0000028Ch], ds
                              mov word ptr [ebp-00000290h], es
                              mov word ptr [ebp-00000294h], fs
                              mov word ptr [ebp-00000298h], gs
                              pushfd
                              pop dword ptr [ebp-00000264h]
                              mov eax, dword ptr [ebp+04h]
                              mov dword ptr [ebp-0000026Ch], eax
                              lea eax, dword ptr [ebp+04h]
                              mov dword ptr [ebp-00000260h], eax
                              mov dword ptr [ebp-00000324h], 00010001h
                              mov eax, dword ptr [eax-04h]
                              push 00000050h
                              mov dword ptr [ebp-00000270h], eax
                              lea eax, dword ptr [ebp-58h]
                              push esi
                              push eax
                              call 00007F64FCBB3E0Dh
                              Programming Language:
                              • [C++] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x6eeb80x104.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x790000x4b54.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x3bc8.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x6d3500x38.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x6d3e40x18.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d3880x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x590000x500.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x571f50x57200e504ab64b98631753dc227346d757c52False0.5716379348995696data6.6273936921798455IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x590000x179dc0x17a0003563836e8ba6bd75dd82177f19b0089False0.5008370535714286data5.862029025853186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x710000x5d440xe000eaccffe1cb836994ce5d3ccfb22d4f9False0.22126116071428573data3.0035180736120775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .tls0x770000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .gfids0x780000x2300x4009ca325bce9f8c0342c0381814603584aFalse0.330078125data2.3999762503719224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .rsrc0x790000x4b540x4c000a40fc3744323f761179b52455512afbFalse0.2842824835526316data3.9926165057586984IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x7e0000x3bc80x3c00047d13d1dd0f82094cdf10f08253441eFalse0.7640625data6.723768218094163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x7918c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                              RT_ICON0x795f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                              RT_ICON0x79f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                              RT_ICON0x7b0240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                              RT_RCDATA0x7d5cc0x547data1.008142116950407
                              RT_GROUP_ICON0x7db140x3edataEnglishUnited States0.8064516129032258
                              DLLImport
                              KERNEL32.dllFindNextFileA, ExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, UnmapViewOfFile, DuplicateHandle, CreateFileMappingW, MapViewOfFile, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, FindFirstFileA, FormatMessageA, FindNextVolumeW, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, GetFileSize, TerminateThread, GetLastError, CreateDirectoryW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, CreateMutexA, GetCurrentProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, SetConsoleOutputCP, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                              USER32.dllGetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, DispatchMessageA, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CloseWindow, SendInput, EnumDisplaySettingsW, mouse_event, CreatePopupMenu, TranslateMessage, TrackPopupMenu, DefWindowProcA, CreateWindowExA, AppendMenuA, GetSystemMetrics, RegisterClassExA, GetCursorPos, SystemParametersInfoW, GetWindowThreadProcessId, MapVirtualKeyA, DrawIcon, GetIconInfo
                              GDI32.dllBitBlt, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteObject, CreateDCA, GetObjectA, DeleteDC
                              ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                              SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                              ole32.dllCoInitializeEx, CoUninitialize, CoGetObject
                              SHLWAPI.dllPathFileExistsW, PathFileExistsA, StrToIntA
                              WINMM.dllwaveInOpen, waveInStart, waveInAddBuffer, PlaySoundW, mciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInPrepareHeader, waveInUnprepareHeader
                              WS2_32.dllgethostbyname, send, WSAStartup, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, WSAGetLastError, recv, connect, socket
                              urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                              gdiplus.dllGdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipAlloc, GdipCloneImage, GdipGetImageEncoders, GdiplusStartup, GdipLoadImageFromStream
                              WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-11-23T06:53:30.564688+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549726154.216.17.2042405TCP
                              2024-11-23T06:53:33.921719+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549737154.216.17.2042405TCP
                              2024-11-23T06:53:37.311810+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549750154.216.17.2042405TCP
                              2024-11-23T06:53:40.697560+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549757154.216.17.2042405TCP
                              2024-11-23T06:53:44.047747+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549768154.216.17.2042405TCP
                              2024-11-23T06:53:47.495661+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549775154.216.17.2042405TCP
                              2024-11-23T06:53:50.911072+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549786154.216.17.2042405TCP
                              2024-11-23T06:53:54.283398+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549793154.216.17.2042405TCP
                              2024-11-23T06:53:57.683528+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549805154.216.17.2042405TCP
                              2024-11-23T06:54:01.121314+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549811154.216.17.2042405TCP
                              2024-11-23T06:54:04.543063+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549821154.216.17.2042405TCP
                              2024-11-23T06:54:07.933369+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549829154.216.17.2042405TCP
                              2024-11-23T06:54:11.329692+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549839154.216.17.2042405TCP
                              2024-11-23T06:54:14.672259+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549846154.216.17.2042405TCP
                              2024-11-23T06:54:18.103862+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549856154.216.17.2042405TCP
                              2024-11-23T06:54:21.532976+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549863154.216.17.2042405TCP
                              2024-11-23T06:54:24.932881+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549874154.216.17.2042405TCP
                              2024-11-23T06:54:28.369691+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549883154.216.17.2042405TCP
                              2024-11-23T06:54:32.080002+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549894154.216.17.2042405TCP
                              2024-11-23T06:54:35.480636+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549902154.216.17.2042405TCP
                              2024-11-23T06:54:38.846457+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549911154.216.17.2042405TCP
                              2024-11-23T06:54:42.204358+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549920154.216.17.2042405TCP
                              2024-11-23T06:54:45.636837+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549928154.216.17.2042405TCP
                              2024-11-23T06:54:49.002216+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549937154.216.17.2042405TCP
                              2024-11-23T06:54:52.449307+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549946154.216.17.2042405TCP
                              2024-11-23T06:54:55.949127+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549956154.216.17.2042405TCP
                              2024-11-23T06:54:59.314972+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549963154.216.17.2042405TCP
                              2024-11-23T06:55:02.746917+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549974154.216.17.2042405TCP
                              2024-11-23T06:55:06.137825+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549981154.216.17.2042405TCP
                              2024-11-23T06:55:09.502721+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549991154.216.17.2042405TCP
                              2024-11-23T06:55:12.943149+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549998154.216.17.2042405TCP
                              2024-11-23T06:55:16.332004+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550008154.216.17.2042405TCP
                              2024-11-23T06:55:19.723234+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550015154.216.17.2042405TCP
                              2024-11-23T06:55:23.136212+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550025154.216.17.2042405TCP
                              2024-11-23T06:55:26.488377+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550032154.216.17.2042405TCP
                              2024-11-23T06:55:29.829081+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550033154.216.17.2042405TCP
                              2024-11-23T06:55:33.425143+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550034154.216.17.2042405TCP
                              2024-11-23T06:55:36.643997+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550035154.216.17.2042405TCP
                              2024-11-23T06:55:39.899365+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550036154.216.17.2042405TCP
                              2024-11-23T06:55:43.107206+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550037154.216.17.2042405TCP
                              2024-11-23T06:55:46.301201+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550038154.216.17.2042405TCP
                              2024-11-23T06:55:49.418902+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550039154.216.17.2042405TCP
                              2024-11-23T06:55:52.487764+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550040154.216.17.2042405TCP
                              2024-11-23T06:55:55.595275+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550042154.216.17.2042405TCP
                              2024-11-23T06:55:58.685858+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550043154.216.17.2042405TCP
                              2024-11-23T06:56:01.762109+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550044154.216.17.2042405TCP
                              2024-11-23T06:56:04.811170+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550045154.216.17.2042405TCP
                              2024-11-23T06:56:07.797224+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550046154.216.17.2042405TCP
                              2024-11-23T06:56:10.736638+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550047154.216.17.2042405TCP
                              2024-11-23T06:56:13.692388+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550048154.216.17.2042405TCP
                              2024-11-23T06:56:16.675593+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550049154.216.17.2042405TCP
                              2024-11-23T06:56:19.654928+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550050154.216.17.2042405TCP
                              2024-11-23T06:56:22.544965+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550051154.216.17.2042405TCP
                              2024-11-23T06:56:25.441728+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550052154.216.17.2042405TCP
                              2024-11-23T06:56:28.253231+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550053154.216.17.2042405TCP
                              2024-11-23T06:56:31.137762+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550054154.216.17.2042405TCP
                              2024-11-23T06:56:34.358810+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550055154.216.17.2042405TCP
                              2024-11-23T06:56:37.216308+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550056154.216.17.2042405TCP
                              2024-11-23T06:56:40.077532+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550057154.216.17.2042405TCP
                              2024-11-23T06:56:42.921056+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550058154.216.17.2042405TCP
                              2024-11-23T06:56:45.709296+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550060154.216.17.2042405TCP
                              2024-11-23T06:56:48.426392+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550061154.216.17.2042405TCP
                              2024-11-23T06:56:51.217298+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550062154.216.17.2042405TCP
                              2024-11-23T06:56:53.971335+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550063154.216.17.2042405TCP
                              2024-11-23T06:56:56.709350+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550064154.216.17.2042405TCP
                              2024-11-23T06:56:59.425295+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550065154.216.17.2042405TCP
                              2024-11-23T06:57:02.129798+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550066154.216.17.2042405TCP
                              2024-11-23T06:57:04.818605+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550068154.216.17.2042405TCP
                              2024-11-23T06:57:07.498038+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550069154.216.17.2042405TCP
                              2024-11-23T06:57:10.170399+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550070154.216.17.2042405TCP
                              2024-11-23T06:57:12.851427+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550071154.216.17.2042405TCP
                              2024-11-23T06:57:15.530292+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550072154.216.17.2042405TCP
                              2024-11-23T06:57:18.189391+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550073154.216.17.2042405TCP
                              2024-11-23T06:57:20.818781+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550074154.216.17.2042405TCP
                              2024-11-23T06:57:23.443823+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550075154.216.17.2042405TCP
                              2024-11-23T06:57:26.068180+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550076154.216.17.2042405TCP
                              2024-11-23T06:57:28.750111+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550077154.216.17.2042405TCP
                              2024-11-23T06:57:31.333893+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550078154.216.17.2042405TCP
                              2024-11-23T06:57:34.264494+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.550079154.216.17.2042405TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 23, 2024 06:53:28.202692032 CET497262405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:28.322711945 CET240549726154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:28.322812080 CET497262405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:28.339469910 CET497262405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:28.459023952 CET240549726154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:30.564583063 CET240549726154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:30.564687967 CET497262405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:30.564826965 CET497262405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:30.684259892 CET240549726154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:31.574526072 CET497372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:31.695522070 CET240549737154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:31.695651054 CET497372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:31.701085091 CET497372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:31.820868015 CET240549737154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:33.921504021 CET240549737154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:33.921719074 CET497372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:33.921817064 CET497372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:34.041254997 CET240549737154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:34.934257030 CET497502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:35.053955078 CET240549750154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:35.054043055 CET497502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:35.063765049 CET497502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:35.183289051 CET240549750154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:37.311695099 CET240549750154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:37.311810017 CET497502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:37.311872005 CET497502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:37.431483984 CET240549750154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:38.324620008 CET497572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:38.444240093 CET240549757154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:38.444400072 CET497572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:38.447906971 CET497572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:38.567404032 CET240549757154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:40.697443962 CET240549757154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:40.697560072 CET497572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:40.697627068 CET497572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:40.817161083 CET240549757154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:41.699829102 CET497682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:41.819446087 CET240549768154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:41.819669962 CET497682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:41.823235989 CET497682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:41.942873955 CET240549768154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:44.047612906 CET240549768154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:44.047746897 CET497682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:44.047746897 CET497682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:44.167408943 CET240549768154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:45.058922052 CET497752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:45.178493023 CET240549775154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:45.180778980 CET497752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:45.184542894 CET497752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:45.304168940 CET240549775154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:47.495584965 CET240549775154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:47.495661020 CET497752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:47.495837927 CET497752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:47.615308046 CET240549775154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:48.513111115 CET497862405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:48.632740974 CET240549786154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:48.632940054 CET497862405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:48.636930943 CET497862405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:48.756448984 CET240549786154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:50.907305956 CET240549786154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:50.911072016 CET497862405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:50.911128044 CET497862405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:51.030615091 CET240549786154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:51.918144941 CET497932405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:52.037681103 CET240549793154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:52.037841082 CET497932405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:52.041486979 CET497932405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:52.161263943 CET240549793154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:54.283329964 CET240549793154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:54.283397913 CET497932405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:54.283480883 CET497932405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:54.403038025 CET240549793154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:55.293148041 CET498052405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:55.412749052 CET240549805154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:55.412848949 CET498052405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:55.416263103 CET498052405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:55.535787106 CET240549805154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:57.683442116 CET240549805154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:57.683527946 CET498052405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:57.683581114 CET498052405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:57.803127050 CET240549805154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:58.700062990 CET498112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:58.819750071 CET240549811154.216.17.204192.168.2.5
                              Nov 23, 2024 06:53:58.819901943 CET498112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:58.823935986 CET498112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:53:58.943470001 CET240549811154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:01.121104002 CET240549811154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:01.121314049 CET498112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:01.121378899 CET498112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:01.240921021 CET240549811154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:02.136934996 CET498212405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:02.256688118 CET240549821154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:02.256822109 CET498212405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:02.260298014 CET498212405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:02.379832029 CET240549821154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:04.542994976 CET240549821154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:04.543062925 CET498212405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:04.543127060 CET498212405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:04.662647963 CET240549821154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:05.558763981 CET498292405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:05.678293943 CET240549829154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:05.678400040 CET498292405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:05.682012081 CET498292405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:05.801567078 CET240549829154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:07.933295965 CET240549829154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:07.933368921 CET498292405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:07.933424950 CET498292405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:08.052879095 CET240549829154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:08.949306965 CET498392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:09.068952084 CET240549839154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:09.069118023 CET498392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:09.072463989 CET498392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:09.191998005 CET240549839154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:11.329602957 CET240549839154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:11.329691887 CET498392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:11.329754114 CET498392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:11.449297905 CET240549839154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:12.340022087 CET498462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:12.459544897 CET240549846154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:12.459719896 CET498462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:12.463356018 CET498462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:12.582882881 CET240549846154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:14.672139883 CET240549846154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:14.672259092 CET498462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:14.672420979 CET498462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:14.791898966 CET240549846154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:15.684187889 CET498562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:15.803791046 CET240549856154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:15.803997040 CET498562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:15.807498932 CET498562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:15.926994085 CET240549856154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:18.103779078 CET240549856154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:18.103862047 CET498562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:18.103924036 CET498562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:18.223588943 CET240549856154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:19.105452061 CET498632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:19.225066900 CET240549863154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:19.226793051 CET498632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:19.230521917 CET498632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:19.350078106 CET240549863154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:21.532856941 CET240549863154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:21.532975912 CET498632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:21.533117056 CET498632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:21.652496099 CET240549863154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:22.554588079 CET498742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:22.674079895 CET240549874154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:22.674170971 CET498742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:22.677709103 CET498742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:22.842009068 CET240549874154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:24.932730913 CET240549874154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:24.932881117 CET498742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:24.932881117 CET498742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:25.052409887 CET240549874154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:25.949706078 CET498832405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:26.069246054 CET240549883154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:26.069341898 CET498832405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:26.072777987 CET498832405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:26.192219019 CET240549883154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:28.369620085 CET240549883154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:28.369690895 CET498832405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:28.369751930 CET498832405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:28.489214897 CET240549883154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:29.704689026 CET498942405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:29.824310064 CET240549894154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:29.824407101 CET498942405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:29.828612089 CET498942405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:29.948086977 CET240549894154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:32.079922915 CET240549894154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:32.080002069 CET498942405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:32.080101967 CET498942405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:32.199624062 CET240549894154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:33.090104103 CET499022405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:33.209779024 CET240549902154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:33.209855080 CET499022405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:33.214453936 CET499022405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:33.333893061 CET240549902154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:35.479659081 CET240549902154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:35.480635881 CET499022405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:35.480712891 CET499022405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:35.600735903 CET240549902154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:36.496373892 CET499112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:36.616070032 CET240549911154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:36.616163969 CET499112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:36.619723082 CET499112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:36.739211082 CET240549911154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:38.845776081 CET240549911154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:38.846457005 CET499112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:38.846587896 CET499112405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:38.966178894 CET240549911154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:39.856410027 CET499202405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:39.976032019 CET240549920154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:39.976155043 CET499202405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:39.979461908 CET499202405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:40.098928928 CET240549920154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:42.204231977 CET240549920154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:42.204358101 CET499202405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:42.204358101 CET499202405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:42.324274063 CET240549920154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:43.218692064 CET499282405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:43.338368893 CET240549928154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:43.338747025 CET499282405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:43.346281052 CET499282405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:43.465913057 CET240549928154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:45.636697054 CET240549928154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:45.636837006 CET499282405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:45.636837006 CET499282405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:45.756362915 CET240549928154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:46.655282021 CET499372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:46.775032997 CET240549937154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:46.775124073 CET499372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:46.778897047 CET499372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:46.898298025 CET240549937154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:49.002118111 CET240549937154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:49.002216101 CET499372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:49.002216101 CET499372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:49.121762991 CET240549937154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:50.012088060 CET499462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:50.131733894 CET240549946154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:50.131827116 CET499462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:50.135175943 CET499462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:50.255508900 CET240549946154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:52.449191093 CET240549946154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:52.449306965 CET499462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:52.449306965 CET499462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:52.568780899 CET240549946154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:53.503634930 CET499562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:53.623172998 CET240549956154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:53.623323917 CET499562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:53.650355101 CET499562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:53.769871950 CET240549956154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:55.949060917 CET240549956154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:55.949126959 CET499562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:55.949218035 CET499562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:56.068877935 CET240549956154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:56.964895964 CET499632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:57.084521055 CET240549963154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:57.084633112 CET499632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:57.088304996 CET499632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:57.207875013 CET240549963154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:59.314847946 CET240549963154.216.17.204192.168.2.5
                              Nov 23, 2024 06:54:59.314971924 CET499632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:59.314971924 CET499632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:54:59.434501886 CET240549963154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:00.324477911 CET499742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:00.444106102 CET240549974154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:00.444236040 CET499742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:00.447669983 CET499742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:00.567202091 CET240549974154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:02.746792078 CET240549974154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:02.746917009 CET499742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:02.746917009 CET499742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:02.866450071 CET240549974154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:03.762204885 CET499812405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:03.881788969 CET240549981154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:03.881875038 CET499812405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:03.886075974 CET499812405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:04.005601883 CET240549981154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:06.137753010 CET240549981154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:06.137825012 CET499812405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:06.138611078 CET499812405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:06.258143902 CET240549981154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:07.153351068 CET499912405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:07.272871971 CET240549991154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:07.273102045 CET499912405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:07.276230097 CET499912405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:07.395751953 CET240549991154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:09.502614021 CET240549991154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:09.502721071 CET499912405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:09.502721071 CET499912405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:09.622891903 CET240549991154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:10.511694908 CET499982405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:10.631352901 CET240549998154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:10.631442070 CET499982405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:10.636699915 CET499982405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:10.758066893 CET240549998154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:12.940993071 CET240549998154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:12.943149090 CET499982405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:12.943149090 CET499982405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:13.062695026 CET240549998154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:13.952811003 CET500082405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:14.072318077 CET240550008154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:14.072391987 CET500082405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:14.077178001 CET500082405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:14.196635008 CET240550008154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:16.331909895 CET240550008154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:16.332004070 CET500082405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:16.369474888 CET500082405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:16.489001989 CET240550008154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:17.371227026 CET500152405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:17.490847111 CET240550015154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:17.490947962 CET500152405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:17.495420933 CET500152405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:17.614883900 CET240550015154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:19.721457958 CET240550015154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:19.723233938 CET500152405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:19.723408937 CET500152405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:19.842787981 CET240550015154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:20.701050043 CET500252405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:20.820619106 CET240550025154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:20.820708036 CET500252405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:20.824728012 CET500252405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:20.944144964 CET240550025154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:23.136086941 CET240550025154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:23.136212111 CET500252405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:23.136285067 CET500252405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:23.255816936 CET240550025154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:24.074404955 CET500322405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:24.193985939 CET240550032154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:24.194088936 CET500322405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:24.197624922 CET500322405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:24.317049980 CET240550032154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:26.488318920 CET240550032154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:26.488377094 CET500322405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:26.488439083 CET500322405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:26.608006001 CET240550032154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:27.402650118 CET500332405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:27.522156000 CET240550033154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:27.522295952 CET500332405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:27.527281046 CET500332405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:27.646785021 CET240550033154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:29.825453043 CET240550033154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:29.829081059 CET500332405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:29.829113960 CET500332405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:29.948574066 CET240550033154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:31.030122995 CET500342405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:31.149657965 CET240550034154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:31.153110981 CET500342405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:31.156390905 CET500342405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:31.275823116 CET240550034154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:33.423423052 CET240550034154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:33.425143003 CET500342405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:33.425370932 CET500342405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:33.544817924 CET240550034154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:34.288120031 CET500352405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:34.408060074 CET240550035154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:34.411139011 CET500352405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:34.482290030 CET500352405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:34.601716042 CET240550035154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:36.643861055 CET240550035154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:36.643996954 CET500352405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:36.644077063 CET500352405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:36.763529062 CET240550035154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:37.465271950 CET500362405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:37.584897995 CET240550036154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:37.585100889 CET500362405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:37.588478088 CET500362405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:37.707881927 CET240550036154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:39.899291039 CET240550036154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:39.899364948 CET500362405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:39.899409056 CET500362405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:40.019325018 CET240550036154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:40.699721098 CET500372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:40.819834948 CET240550037154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:40.823213100 CET500372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:40.826700926 CET500372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:40.946167946 CET240550037154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:43.107069969 CET240550037154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:43.107206106 CET500372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:43.107206106 CET500372405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:43.226805925 CET240550037154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:43.871891022 CET500382405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:43.992465973 CET240550038154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:43.992566109 CET500382405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:43.996121883 CET500382405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:44.115581989 CET240550038154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:46.301127911 CET240550038154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:46.301201105 CET500382405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:46.301253080 CET500382405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:46.420734882 CET240550038154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:47.043142080 CET500392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:47.162619114 CET240550039154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:47.165127039 CET500392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:47.168592930 CET500392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:47.287991047 CET240550039154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:49.418821096 CET240550039154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:49.418901920 CET500392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:49.418945074 CET500392405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:49.538430929 CET240550039154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:50.137193918 CET500402405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:50.256833076 CET240550040154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:50.259212017 CET500402405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:50.263504982 CET500402405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:50.382982016 CET240550040154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:52.487668991 CET240550040154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:52.487763882 CET500402405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:52.487763882 CET500402405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:52.607276917 CET240550040154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:53.184045076 CET500422405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:53.303601027 CET240550042154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:53.307126999 CET500422405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:53.310617924 CET500422405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:53.430088997 CET240550042154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:55.592086077 CET240550042154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:55.595274925 CET500422405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:55.595319986 CET500422405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:55.714910030 CET240550042154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:56.262310982 CET500432405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:56.381859064 CET240550043154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:56.383445978 CET500432405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:56.386882067 CET500432405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:56.506386042 CET240550043154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:58.685792923 CET240550043154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:58.685858011 CET500432405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:58.685991049 CET500432405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:58.805394888 CET240550043154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:59.340207100 CET500442405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:59.459681988 CET240550044154.216.17.204192.168.2.5
                              Nov 23, 2024 06:55:59.460118055 CET500442405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:59.463051081 CET500442405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:55:59.582606077 CET240550044154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:01.761966944 CET240550044154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:01.762109041 CET500442405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:01.762191057 CET500442405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:01.881675959 CET240550044154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:02.387218952 CET500452405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:02.506886959 CET240550045154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:02.507004023 CET500452405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:02.510505915 CET500452405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:02.630038977 CET240550045154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:04.809845924 CET240550045154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:04.811170101 CET500452405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:04.811209917 CET500452405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:04.930764914 CET240550045154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:05.418596983 CET500462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:05.538212061 CET240550046154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:05.538863897 CET500462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:05.541729927 CET500462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:05.661218882 CET240550046154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:07.793359995 CET240550046154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:07.797224045 CET500462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:07.797224045 CET500462405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:07.916783094 CET240550046154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:08.387587070 CET500472405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:08.507096052 CET240550047154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:08.507180929 CET500472405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:08.511097908 CET500472405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:08.630539894 CET240550047154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:10.736581087 CET240550047154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:10.736638069 CET500472405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:10.736725092 CET500472405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:10.856235027 CET240550047154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:11.309093952 CET500482405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:11.428719044 CET240550048154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:11.433406115 CET500482405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:11.436598063 CET500482405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:11.556147099 CET240550048154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:13.690572023 CET240550048154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:13.692388058 CET500482405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:13.692388058 CET500482405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:13.812016010 CET240550048154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:14.247050047 CET500492405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:14.366753101 CET240550049154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:14.366854906 CET500492405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:14.370222092 CET500492405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:14.627105951 CET240550049154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:16.675407887 CET240550049154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:16.675592899 CET500492405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:16.675776005 CET500492405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:16.795456886 CET240550049154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:17.215289116 CET500502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:17.334786892 CET240550050154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:17.334949970 CET500502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:17.338145971 CET500502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:17.458937883 CET240550050154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:19.654848099 CET240550050154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:19.654927969 CET500502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:19.654977083 CET500502405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:19.776549101 CET240550050154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:20.168934107 CET500512405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:20.288397074 CET240550051154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:20.288496971 CET500512405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:20.298644066 CET500512405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:20.418138981 CET240550051154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:22.544775963 CET240550051154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:22.544965029 CET500512405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:22.544965029 CET500512405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:22.664525032 CET240550051154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:23.045335054 CET500522405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:23.164849997 CET240550052154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:23.167411089 CET500522405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:23.182539940 CET500522405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:23.302242994 CET240550052154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:25.441662073 CET240550052154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:25.441728115 CET500522405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:25.441787958 CET500522405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:25.561297894 CET240550052154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:25.918576956 CET500532405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:26.038157940 CET240550053154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:26.038233042 CET500532405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:26.042592049 CET500532405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:26.162954092 CET240550053154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:28.253146887 CET240550053154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:28.253231049 CET500532405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:28.253330946 CET500532405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:28.372764111 CET240550053154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:28.715465069 CET500542405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:28.835001945 CET240550054154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:28.835217953 CET500542405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:28.838525057 CET500542405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:28.957972050 CET240550054154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:31.137577057 CET240550054154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:31.137762070 CET500542405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:31.137762070 CET500542405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:31.257355928 CET240550054154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:31.918898106 CET500552405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:32.038528919 CET240550055154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:32.038641930 CET500552405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:32.046632051 CET500552405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:32.166132927 CET240550055154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:34.358725071 CET240550055154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:34.358809948 CET500552405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:34.358849049 CET500552405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:34.478916883 CET240550055154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:34.793348074 CET500562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:34.912925005 CET240550056154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:34.913281918 CET500562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:34.916654110 CET500562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:35.036102057 CET240550056154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:37.215975046 CET240550056154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:37.216308117 CET500562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:37.216525078 CET500562405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:37.335994005 CET240550056154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:37.637167931 CET500572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:37.756645918 CET240550057154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:37.759251118 CET500572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:37.761168957 CET500572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:37.880600929 CET240550057154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:40.077442884 CET240550057154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:40.077532053 CET500572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:40.077586889 CET500572405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:40.197016954 CET240550057154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:40.480894089 CET500582405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:40.600553989 CET240550058154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:40.600668907 CET500582405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:40.605145931 CET500582405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:40.724908113 CET240550058154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:42.920962095 CET240550058154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:42.921056032 CET500582405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:42.921125889 CET500582405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:43.040663958 CET240550058154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:43.327233076 CET500602405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:43.446806908 CET240550060154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:43.446890116 CET500602405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:43.451174974 CET500602405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:43.570647001 CET240550060154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:45.706959963 CET240550060154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:45.709295988 CET500602405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:45.709295988 CET500602405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:45.829122066 CET240550060154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:46.090434074 CET500612405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:46.210057020 CET240550061154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:46.210201025 CET500612405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:46.213442087 CET500612405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:46.333059072 CET240550061154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:48.426328897 CET240550061154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:48.426392078 CET500612405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:48.426435947 CET500612405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:48.545902967 CET240550061154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:48.793504000 CET500622405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:48.913153887 CET240550062154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:48.916661978 CET500622405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:48.916661978 CET500622405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:49.036353111 CET240550062154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:51.216270924 CET240550062154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:51.217298031 CET500622405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:51.217441082 CET500622405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:51.337097883 CET240550062154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:51.578228951 CET500632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:51.697777987 CET240550063154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:51.697912931 CET500632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:51.701903105 CET500632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:51.821376085 CET240550063154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:53.968014956 CET240550063154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:53.971334934 CET500632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:53.971334934 CET500632405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:54.090920925 CET240550063154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:54.337240934 CET500642405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:54.456744909 CET240550064154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:54.459619999 CET500642405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:54.464195013 CET500642405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:54.583761930 CET240550064154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:56.707787037 CET240550064154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:56.709350109 CET500642405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:56.709383965 CET500642405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:56.829082012 CET240550064154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:57.043214083 CET500652405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:57.162755013 CET240550065154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:57.162841082 CET500652405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:57.167103052 CET500652405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:57.286580086 CET240550065154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:59.421519041 CET240550065154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:59.425295115 CET500652405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:59.425347090 CET500652405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:59.544881105 CET240550065154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:59.756119013 CET500662405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:59.875699043 CET240550066154.216.17.204192.168.2.5
                              Nov 23, 2024 06:56:59.875776052 CET500662405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:59.879827023 CET500662405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:56:59.999378920 CET240550066154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:02.129647970 CET240550066154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:02.129797935 CET500662405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:02.129797935 CET500662405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:02.249371052 CET240550066154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:02.459707022 CET500682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:02.579303026 CET240550068154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:02.579371929 CET500682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:02.582520962 CET500682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:02.702043056 CET240550068154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:04.818533897 CET240550068154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:04.818604946 CET500682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:04.818696022 CET500682405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:04.938308001 CET240550068154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:05.121906996 CET500692405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:05.242558002 CET240550069154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:05.242639065 CET500692405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:05.246203899 CET500692405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:05.365714073 CET240550069154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:07.497853041 CET240550069154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:07.498038054 CET500692405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:07.498038054 CET500692405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:07.617659092 CET240550069154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:07.793410063 CET500702405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:07.913014889 CET240550070154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:07.913119078 CET500702405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:07.917412996 CET500702405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:08.036919117 CET240550070154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:10.169926882 CET240550070154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:10.170398951 CET500702405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:10.170398951 CET500702405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:10.290163994 CET240550070154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:10.467804909 CET500712405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:10.587625980 CET240550071154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:10.587790012 CET500712405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:10.591214895 CET500712405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:10.715430021 CET240550071154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:12.848157883 CET240550071154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:12.851427078 CET500712405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:12.851427078 CET500712405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:12.971117020 CET240550071154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:13.122298956 CET500722405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:13.242042065 CET240550072154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:13.242297888 CET500722405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:13.245914936 CET500722405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:13.365654945 CET240550072154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:15.530210018 CET240550072154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:15.530292034 CET500722405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:15.530334949 CET500722405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:15.649910927 CET240550072154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:15.793430090 CET500732405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:15.913048983 CET240550073154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:15.914699078 CET500732405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:15.918174982 CET500732405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:16.037661076 CET240550073154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:18.187351942 CET240550073154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:18.189390898 CET500732405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:18.189426899 CET500732405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:18.308975935 CET240550073154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:18.449745893 CET500742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:18.569245100 CET240550074154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:18.569402933 CET500742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:18.574094057 CET500742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:18.693701029 CET240550074154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:20.818633080 CET240550074154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:20.818780899 CET500742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:20.818780899 CET500742405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:20.938363075 CET240550074154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:21.074508905 CET500752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:21.194174051 CET240550075154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:21.195888996 CET500752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:21.199333906 CET500752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:21.318866014 CET240550075154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:23.443743944 CET240550075154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:23.443823099 CET500752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:23.443882942 CET500752405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:23.563410997 CET240550075154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:23.684262037 CET500762405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:23.803878069 CET240550076154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:23.803992033 CET500762405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:23.807424068 CET500762405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:23.926927090 CET240550076154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:26.068073988 CET240550076154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:26.068180084 CET500762405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:26.068180084 CET500762405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:26.188621998 CET240550076154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:26.309628010 CET500772405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:26.430195093 CET240550077154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:26.430274963 CET500772405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:26.433669090 CET500772405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:26.553348064 CET240550077154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:28.750046968 CET240550077154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:28.750111103 CET500772405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:28.750215054 CET500772405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:28.870567083 CET240550077154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:28.981556892 CET500782405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:29.101286888 CET240550078154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:29.103446007 CET500782405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:29.107014894 CET500782405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:29.226759911 CET240550078154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:31.333825111 CET240550078154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:31.333893061 CET500782405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:31.334007978 CET500782405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:31.453497887 CET240550078154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:31.880731106 CET500792405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:32.000288963 CET240550079154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:32.000396967 CET500792405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:32.003685951 CET500792405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:32.123188019 CET240550079154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:34.264256001 CET240550079154.216.17.204192.168.2.5
                              Nov 23, 2024 06:57:34.264493942 CET500792405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:34.264493942 CET500792405192.168.2.5154.216.17.204
                              Nov 23, 2024 06:57:34.384172916 CET240550079154.216.17.204192.168.2.5
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 23, 2024 06:53:28.057821989 CET4942053192.168.2.51.1.1.1
                              Nov 23, 2024 06:53:28.198398113 CET53494201.1.1.1192.168.2.5
                              Nov 23, 2024 06:54:29.370994091 CET5139953192.168.2.51.1.1.1
                              Nov 23, 2024 06:54:29.703468084 CET53513991.1.1.1192.168.2.5
                              Nov 23, 2024 06:55:30.714679003 CET4977853192.168.2.51.1.1.1
                              Nov 23, 2024 06:55:31.027460098 CET53497781.1.1.1192.168.2.5
                              Nov 23, 2024 06:56:31.589953899 CET5429553192.168.2.51.1.1.1
                              Nov 23, 2024 06:56:31.917799950 CET53542951.1.1.1192.168.2.5
                              Nov 23, 2024 06:57:31.558801889 CET5586753192.168.2.51.1.1.1
                              Nov 23, 2024 06:57:31.879434109 CET53558671.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Nov 23, 2024 06:53:28.057821989 CET192.168.2.51.1.1.10x76a2Standard query (0)shilajat.duckdns.orgA (IP address)IN (0x0001)false
                              Nov 23, 2024 06:54:29.370994091 CET192.168.2.51.1.1.10xe35Standard query (0)shilajat.duckdns.orgA (IP address)IN (0x0001)false
                              Nov 23, 2024 06:55:30.714679003 CET192.168.2.51.1.1.10x73e5Standard query (0)shilajat.duckdns.orgA (IP address)IN (0x0001)false
                              Nov 23, 2024 06:56:31.589953899 CET192.168.2.51.1.1.10xbd05Standard query (0)shilajat.duckdns.orgA (IP address)IN (0x0001)false
                              Nov 23, 2024 06:57:31.558801889 CET192.168.2.51.1.1.10x5930Standard query (0)shilajat.duckdns.orgA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Nov 23, 2024 06:53:21.929395914 CET1.1.1.1192.168.2.50x5008No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                              Nov 23, 2024 06:53:21.929395914 CET1.1.1.1192.168.2.50x5008No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                              Nov 23, 2024 06:53:28.198398113 CET1.1.1.1192.168.2.50x76a2No error (0)shilajat.duckdns.org154.216.17.204A (IP address)IN (0x0001)false
                              Nov 23, 2024 06:54:29.703468084 CET1.1.1.1192.168.2.50xe35No error (0)shilajat.duckdns.org154.216.17.204A (IP address)IN (0x0001)false
                              Nov 23, 2024 06:55:31.027460098 CET1.1.1.1192.168.2.50x73e5No error (0)shilajat.duckdns.org154.216.17.204A (IP address)IN (0x0001)false
                              Nov 23, 2024 06:56:31.917799950 CET1.1.1.1192.168.2.50xbd05No error (0)shilajat.duckdns.org154.216.17.204A (IP address)IN (0x0001)false
                              Nov 23, 2024 06:57:31.879434109 CET1.1.1.1192.168.2.50x5930No error (0)shilajat.duckdns.org154.216.17.204A (IP address)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Target ID:0
                              Start time:00:53:27
                              Start date:23/11/2024
                              Path:C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe"
                              Imagebase:0x400000
                              File size:494'592 bytes
                              MD5 hash:C69539E84CC2B3332174B6BBFB5E35E7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.2268673071.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4723514268.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:3.4%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:23.8%
                                Total number of Nodes:1195
                                Total number of Limit Nodes:50
                                execution_graph 47194 43bea8 47196 43beb4 _swprintf ___BuildCatchObject 47194->47196 47195 43bec2 47210 44062d 20 API calls _Atexit 47195->47210 47196->47195 47198 43beec 47196->47198 47205 445909 EnterCriticalSection 47198->47205 47200 43bec7 pre_c_initialization ___BuildCatchObject 47201 43bef7 47206 43bf98 47201->47206 47205->47201 47207 43bfa6 47206->47207 47209 43bf02 47207->47209 47212 4497ec 37 API calls 2 library calls 47207->47212 47211 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 47209->47211 47210->47200 47211->47200 47212->47207 47213 434918 47214 434924 ___BuildCatchObject 47213->47214 47240 434627 47214->47240 47216 43492b 47218 434954 47216->47218 47538 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 47216->47538 47226 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47218->47226 47539 4442d2 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47218->47539 47220 43496d 47222 434973 ___BuildCatchObject 47220->47222 47540 444276 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 47220->47540 47223 4349f3 47251 434ba5 47223->47251 47226->47223 47541 443487 36 API calls 5 library calls 47226->47541 47233 434a15 47234 434a1f 47233->47234 47543 4434bf 28 API calls _Atexit 47233->47543 47236 434a28 47234->47236 47544 443462 28 API calls _Atexit 47234->47544 47545 43479e 13 API calls 2 library calls 47236->47545 47239 434a30 47239->47222 47241 434630 47240->47241 47546 434cb6 IsProcessorFeaturePresent 47241->47546 47243 43463c 47547 438fb1 10 API calls 4 library calls 47243->47547 47245 434641 47246 434645 47245->47246 47548 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47245->47548 47246->47216 47248 43464e 47249 43465c 47248->47249 47549 438fda 8 API calls 3 library calls 47248->47549 47249->47216 47550 436f10 47251->47550 47254 4349f9 47255 444223 47254->47255 47552 44f0d9 47255->47552 47257 44422c 47258 434a02 47257->47258 47556 446895 36 API calls 47257->47556 47260 40ea00 47258->47260 47558 41cbe1 LoadLibraryA GetProcAddress 47260->47558 47262 40ea1c GetModuleFileNameW 47563 40f3fe 47262->47563 47264 40ea38 47578 4020f6 47264->47578 47267 4020f6 28 API calls 47268 40ea56 47267->47268 47584 41beac 47268->47584 47272 40ea68 47610 401e8d 47272->47610 47274 40ea71 47275 40ea84 47274->47275 47276 40eace 47274->47276 47878 40fbee 118 API calls 47275->47878 47616 401e65 47276->47616 47279 40eade 47283 401e65 22 API calls 47279->47283 47280 40ea96 47281 401e65 22 API calls 47280->47281 47282 40eaa2 47281->47282 47879 410f72 36 API calls __EH_prolog 47282->47879 47284 40eafd 47283->47284 47621 40531e 47284->47621 47287 40eab4 47880 40fb9f 78 API calls 47287->47880 47288 40eb0c 47626 406383 47288->47626 47292 40eabd 47881 40f3eb 71 API calls 47292->47881 47298 401fd8 11 API calls 47300 40ef36 47298->47300 47299 401fd8 11 API calls 47301 40eb36 47299->47301 47542 443396 GetModuleHandleW 47300->47542 47302 401e65 22 API calls 47301->47302 47303 40eb3f 47302->47303 47643 401fc0 47303->47643 47305 40eb4a 47306 401e65 22 API calls 47305->47306 47307 40eb63 47306->47307 47308 401e65 22 API calls 47307->47308 47309 40eb7e 47308->47309 47310 40ebe9 47309->47310 47882 406c59 47309->47882 47311 401e65 22 API calls 47310->47311 47316 40ebf6 47311->47316 47313 40ebab 47314 401fe2 28 API calls 47313->47314 47315 40ebb7 47314->47315 47318 401fd8 11 API calls 47315->47318 47317 40ec3d 47316->47317 47323 413584 3 API calls 47316->47323 47647 40d0a4 47317->47647 47320 40ebc0 47318->47320 47887 413584 RegOpenKeyExA 47320->47887 47321 40ec43 47322 40eac6 47321->47322 47650 41b354 47321->47650 47322->47298 47329 40ec21 47323->47329 47327 40f38a 47968 4139e4 30 API calls 47327->47968 47328 40ec5e 47330 40ecb1 47328->47330 47667 407751 47328->47667 47329->47317 47890 4139e4 30 API calls 47329->47890 47333 401e65 22 API calls 47330->47333 47336 40ecba 47333->47336 47335 40f3a0 47969 4124b0 65 API calls ___scrt_get_show_window_mode 47335->47969 47344 40ecc6 47336->47344 47345 40eccb 47336->47345 47338 40ec87 47342 401e65 22 API calls 47338->47342 47339 40ec7d 47891 407773 30 API calls 47339->47891 47354 40ec90 47342->47354 47343 40f3aa 47347 41bcef 28 API calls 47343->47347 47894 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47344->47894 47350 401e65 22 API calls 47345->47350 47346 40ec82 47892 40729b 98 API calls 47346->47892 47351 40f3ba 47347->47351 47352 40ecd4 47350->47352 47776 413a5e RegOpenKeyExW 47351->47776 47671 41bcef 47352->47671 47354->47330 47358 40ecac 47354->47358 47355 40ecdf 47675 401f13 47355->47675 47893 40729b 98 API calls 47358->47893 47362 401f09 11 API calls 47364 40f3d7 47362->47364 47366 401f09 11 API calls 47364->47366 47367 40f3e0 47366->47367 47779 40dd7d 47367->47779 47368 401e65 22 API calls 47370 40ecfc 47368->47370 47373 401e65 22 API calls 47370->47373 47375 40ed16 47373->47375 47374 40f3ea 47376 401e65 22 API calls 47375->47376 47377 40ed30 47376->47377 47378 401e65 22 API calls 47377->47378 47379 40ed49 47378->47379 47380 40edb6 47379->47380 47382 401e65 22 API calls 47379->47382 47381 40edc5 47380->47381 47388 40ef41 ___scrt_get_show_window_mode 47380->47388 47383 40edce 47381->47383 47411 40ee4a ___scrt_get_show_window_mode 47381->47411 47386 40ed5e _wcslen 47382->47386 47384 401e65 22 API calls 47383->47384 47385 40edd7 47384->47385 47387 401e65 22 API calls 47385->47387 47386->47380 47389 401e65 22 API calls 47386->47389 47390 40ede9 47387->47390 47955 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47388->47955 47391 40ed79 47389->47391 47393 401e65 22 API calls 47390->47393 47394 401e65 22 API calls 47391->47394 47395 40edfb 47393->47395 47396 40ed8e 47394->47396 47398 401e65 22 API calls 47395->47398 47895 40da6f 47396->47895 47397 40ef8c 47399 401e65 22 API calls 47397->47399 47400 40ee24 47398->47400 47401 40efb1 47399->47401 47406 401e65 22 API calls 47400->47406 47697 402093 47401->47697 47404 401f13 28 API calls 47405 40edad 47404->47405 47408 401f09 11 API calls 47405->47408 47409 40ee35 47406->47409 47408->47380 47953 40ce34 46 API calls _wcslen 47409->47953 47410 40efc3 47703 4137aa RegCreateKeyA 47410->47703 47687 413982 47411->47687 47415 40eede ctype 47420 401e65 22 API calls 47415->47420 47416 40ee45 47416->47411 47418 401e65 22 API calls 47419 40efe5 47418->47419 47709 43bb2c 47419->47709 47421 40eef5 47420->47421 47421->47397 47425 40ef09 47421->47425 47424 40effc 47956 41ce2c 88 API calls ___scrt_get_show_window_mode 47424->47956 47427 401e65 22 API calls 47425->47427 47426 40f01f 47431 402093 28 API calls 47426->47431 47429 40ef12 47427->47429 47432 41bcef 28 API calls 47429->47432 47430 40f003 CreateThread 47430->47426 48691 41d4ee 10 API calls 47430->48691 47434 40f034 47431->47434 47433 40ef1e 47432->47433 47954 40f4af 107 API calls 47433->47954 47435 402093 28 API calls 47434->47435 47437 40f043 47435->47437 47713 41b580 47437->47713 47438 40ef23 47438->47397 47440 40ef2a 47438->47440 47440->47322 47442 401e65 22 API calls 47443 40f054 47442->47443 47444 401e65 22 API calls 47443->47444 47445 40f066 47444->47445 47446 401e65 22 API calls 47445->47446 47447 40f086 47446->47447 47448 43bb2c _strftime 40 API calls 47447->47448 47449 40f093 47448->47449 47450 401e65 22 API calls 47449->47450 47451 40f09e 47450->47451 47452 401e65 22 API calls 47451->47452 47453 40f0af 47452->47453 47454 401e65 22 API calls 47453->47454 47455 40f0c4 47454->47455 47456 401e65 22 API calls 47455->47456 47457 40f0d5 47456->47457 47458 40f0dc StrToIntA 47457->47458 47737 409e1f 47458->47737 47461 401e65 22 API calls 47462 40f0f7 47461->47462 47463 40f103 47462->47463 47464 40f13c 47462->47464 47957 43455e 47463->47957 47466 401e65 22 API calls 47464->47466 47468 40f14c 47466->47468 47471 40f194 47468->47471 47472 40f158 47468->47472 47469 401e65 22 API calls 47470 40f11f 47469->47470 47473 40f126 CreateThread 47470->47473 47475 401e65 22 API calls 47471->47475 47474 43455e new 22 API calls 47472->47474 47473->47464 48689 41a045 110 API calls 2 library calls 47473->48689 47476 40f161 47474->47476 47478 40f19d 47475->47478 47477 401e65 22 API calls 47476->47477 47479 40f173 47477->47479 47480 40f207 47478->47480 47481 40f1a9 47478->47481 47484 40f17a CreateThread 47479->47484 47482 401e65 22 API calls 47480->47482 47483 401e65 22 API calls 47481->47483 47485 40f210 47482->47485 47486 40f1b9 47483->47486 47484->47471 48694 41a045 110 API calls 2 library calls 47484->48694 47487 40f255 47485->47487 47488 40f21c 47485->47488 47489 401e65 22 API calls 47486->47489 47762 41b69e GetComputerNameExW GetUserNameW 47487->47762 47491 401e65 22 API calls 47488->47491 47492 40f1ce 47489->47492 47494 40f225 47491->47494 47964 40da23 32 API calls 47492->47964 47499 401e65 22 API calls 47494->47499 47495 401f13 28 API calls 47496 40f269 47495->47496 47498 401f09 11 API calls 47496->47498 47501 40f272 47498->47501 47502 40f23a 47499->47502 47500 40f1e1 47503 401f13 28 API calls 47500->47503 47504 40f27b SetProcessDEPPolicy 47501->47504 47505 40f27e CreateThread 47501->47505 47512 43bb2c _strftime 40 API calls 47502->47512 47506 40f1ed 47503->47506 47504->47505 47507 40f293 CreateThread 47505->47507 47508 40f29f 47505->47508 48662 40f7e2 47505->48662 47509 401f09 11 API calls 47506->47509 47507->47508 48690 412132 139 API calls 47507->48690 47510 40f2b4 47508->47510 47511 40f2a8 CreateThread 47508->47511 47513 40f1f6 CreateThread 47509->47513 47516 40f307 47510->47516 47517 402093 28 API calls 47510->47517 47511->47510 48692 412716 38 API calls ___scrt_get_show_window_mode 47511->48692 47514 40f247 47512->47514 47513->47480 48693 401be9 50 API calls _strftime 47513->48693 47965 40c19d 7 API calls 47514->47965 47773 41353a RegOpenKeyExA 47516->47773 47518 40f2d7 47517->47518 47966 4052fd 28 API calls 47518->47966 47523 40f328 47525 41bcef 28 API calls 47523->47525 47527 40f338 47525->47527 47967 413656 31 API calls 47527->47967 47532 40f34e 47533 401f09 11 API calls 47532->47533 47536 40f359 47533->47536 47534 40f381 DeleteFileW 47535 40f388 47534->47535 47534->47536 47535->47343 47536->47343 47536->47534 47537 40f36f Sleep 47536->47537 47537->47536 47538->47216 47539->47220 47540->47226 47541->47223 47542->47233 47543->47234 47544->47236 47545->47239 47546->47243 47547->47245 47548->47248 47549->47246 47551 434bb8 GetStartupInfoW 47550->47551 47551->47254 47553 44f0eb 47552->47553 47554 44f0e2 47552->47554 47553->47257 47557 44efd8 49 API calls 4 library calls 47554->47557 47556->47257 47557->47553 47559 41cc20 LoadLibraryA GetProcAddress 47558->47559 47560 41cc10 GetModuleHandleA GetProcAddress 47558->47560 47561 41cc49 44 API calls 47559->47561 47562 41cc39 LoadLibraryA GetProcAddress 47559->47562 47560->47559 47561->47262 47562->47561 47970 41b539 FindResourceA 47563->47970 47567 40f428 _Yarn 47980 4020b7 47567->47980 47570 401fe2 28 API calls 47571 40f44e 47570->47571 47572 401fd8 11 API calls 47571->47572 47573 40f457 47572->47573 47574 43bda0 _Yarn 21 API calls 47573->47574 47575 40f468 _Yarn 47574->47575 47986 406e13 47575->47986 47577 40f49b 47577->47264 47579 40210c 47578->47579 47580 4023ce 11 API calls 47579->47580 47581 402126 47580->47581 47582 402569 28 API calls 47581->47582 47583 402134 47582->47583 47583->47267 48040 4020df 47584->48040 47586 41bf2f 47587 401fd8 11 API calls 47586->47587 47588 41bf61 47587->47588 47589 401fd8 11 API calls 47588->47589 47591 41bf69 47589->47591 47590 41bf31 48046 4041a2 28 API calls 47590->48046 47594 401fd8 11 API calls 47591->47594 47596 40ea5f 47594->47596 47595 41bf3d 47597 401fe2 28 API calls 47595->47597 47606 40fb52 47596->47606 47599 41bf46 47597->47599 47598 401fe2 28 API calls 47605 41bebf 47598->47605 47600 401fd8 11 API calls 47599->47600 47602 41bf4e 47600->47602 47601 401fd8 11 API calls 47601->47605 48047 41cec5 28 API calls 47602->48047 47605->47586 47605->47590 47605->47598 47605->47601 48044 4041a2 28 API calls 47605->48044 48045 41cec5 28 API calls 47605->48045 47607 40fb5e 47606->47607 47609 40fb65 47606->47609 48048 402163 11 API calls 47607->48048 47609->47272 47611 402163 47610->47611 47615 40219f 47611->47615 48049 402730 11 API calls 47611->48049 47613 402184 48050 402712 11 API calls std::_Deallocate 47613->48050 47615->47274 47617 401e6d 47616->47617 47618 401e75 47617->47618 48051 402158 22 API calls 47617->48051 47618->47279 47622 4020df 11 API calls 47621->47622 47623 40532a 47622->47623 48052 4032a0 47623->48052 47625 405346 47625->47288 48056 4051ef 47626->48056 47628 406391 48060 402055 47628->48060 47631 401fe2 47632 401ff1 47631->47632 47639 402039 47631->47639 47633 4023ce 11 API calls 47632->47633 47634 401ffa 47633->47634 47635 40203c 47634->47635 47637 402015 47634->47637 47636 40267a 11 API calls 47635->47636 47636->47639 48092 403098 28 API calls 47637->48092 47640 401fd8 47639->47640 47641 4023ce 11 API calls 47640->47641 47642 401fe1 47641->47642 47642->47299 47644 401fd2 47643->47644 47645 401fc9 47643->47645 47644->47305 48093 4025e0 28 API calls 47645->48093 48094 401fab 47647->48094 47649 40d0ae CreateMutexA GetLastError 47649->47321 48095 41c048 47650->48095 47655 401fe2 28 API calls 47656 41b390 47655->47656 47657 401fd8 11 API calls 47656->47657 47658 41b398 47657->47658 47659 4135e1 31 API calls 47658->47659 47661 41b3ee 47658->47661 47660 41b3c1 47659->47660 47662 41b3cc StrToIntA 47660->47662 47661->47328 47663 41b3e3 47662->47663 47664 41b3da 47662->47664 47666 401fd8 11 API calls 47663->47666 48104 41cffa 22 API calls 47664->48104 47666->47661 47668 407765 47667->47668 47669 413584 3 API calls 47668->47669 47670 40776c 47669->47670 47670->47338 47670->47339 47672 41bd03 47671->47672 48105 40b93f 47672->48105 47674 41bd0b 47674->47355 47676 401f22 47675->47676 47683 401f6a 47675->47683 47677 402252 11 API calls 47676->47677 47678 401f2b 47677->47678 47679 401f6d 47678->47679 47681 401f46 47678->47681 48138 402336 47679->48138 48137 40305c 28 API calls 47681->48137 47684 401f09 47683->47684 47685 402252 11 API calls 47684->47685 47686 401f12 47685->47686 47686->47368 47688 4139a0 47687->47688 47689 406e13 28 API calls 47688->47689 47690 4139b5 47689->47690 47691 4020f6 28 API calls 47690->47691 47692 4139c5 47691->47692 47693 4137aa 14 API calls 47692->47693 47694 4139cf 47693->47694 47695 401fd8 11 API calls 47694->47695 47696 4139dc 47695->47696 47696->47415 47698 40209b 47697->47698 47699 4023ce 11 API calls 47698->47699 47700 4020a6 47699->47700 48142 4024ed 47700->48142 47704 4137c3 47703->47704 47705 4137fa 47703->47705 47708 4137d5 RegSetValueExA RegCloseKey 47704->47708 47706 401fd8 11 API calls 47705->47706 47707 40efd9 47706->47707 47707->47418 47708->47705 47710 43bb45 _strftime 47709->47710 48146 43ae83 47710->48146 47712 40eff2 47712->47424 47712->47426 47714 41b631 47713->47714 47715 41b596 GetLocalTime 47713->47715 47716 401fd8 11 API calls 47714->47716 47717 40531e 28 API calls 47715->47717 47718 41b639 47716->47718 47719 41b5d8 47717->47719 47720 401fd8 11 API calls 47718->47720 47721 406383 28 API calls 47719->47721 47723 40f048 47720->47723 47722 41b5e4 47721->47722 48174 402f10 47722->48174 47723->47442 47726 406383 28 API calls 47727 41b5fc 47726->47727 48179 40723b 77 API calls 47727->48179 47729 41b60a 47730 401fd8 11 API calls 47729->47730 47731 41b616 47730->47731 47732 401fd8 11 API calls 47731->47732 47733 41b61f 47732->47733 47734 401fd8 11 API calls 47733->47734 47735 41b628 47734->47735 47736 401fd8 11 API calls 47735->47736 47736->47714 47738 409e3d _wcslen 47737->47738 47739 409e48 47738->47739 47740 409e5f 47738->47740 47741 40da6f 32 API calls 47739->47741 47742 40da6f 32 API calls 47740->47742 47743 409e50 47741->47743 47744 409e67 47742->47744 47745 401f13 28 API calls 47743->47745 47746 401f13 28 API calls 47744->47746 47748 409e5a 47745->47748 47747 409e75 47746->47747 47749 401f09 11 API calls 47747->47749 47751 401f09 11 API calls 47748->47751 47750 409e7d 47749->47750 48198 409196 28 API calls 47750->48198 47753 409eb4 47751->47753 48183 40a144 47753->48183 47754 409e8f 48199 403014 47754->48199 47759 401f13 28 API calls 47760 409ea4 47759->47760 47761 401f09 11 API calls 47760->47761 47761->47748 48394 40417e 47762->48394 47767 403014 28 API calls 47768 41b703 47767->47768 47769 401f09 11 API calls 47768->47769 47770 41b70c 47769->47770 47771 401f09 11 API calls 47770->47771 47772 40f25e 47771->47772 47772->47495 47774 41355b RegQueryValueExA RegCloseKey 47773->47774 47775 40f31f 47773->47775 47774->47775 47775->47367 47775->47523 47777 40f3cd 47776->47777 47778 413a7a RegDeleteValueW 47776->47778 47777->47362 47778->47777 47780 40dd96 47779->47780 47781 41353a 3 API calls 47780->47781 47782 40dd9d 47781->47782 47783 40ddbc 47782->47783 48488 401707 47782->48488 47787 414f65 47783->47787 47785 40ddaa 48491 4138b2 RegCreateKeyA 47785->48491 47788 4020df 11 API calls 47787->47788 47789 414f79 47788->47789 48505 41b944 47789->48505 47792 4020df 11 API calls 47793 414f8f 47792->47793 47794 401e65 22 API calls 47793->47794 47795 414f9d 47794->47795 47796 43bb2c _strftime 40 API calls 47795->47796 47797 414faa 47796->47797 47798 414fbc 47797->47798 47799 414faf Sleep 47797->47799 47800 402093 28 API calls 47798->47800 47799->47798 47801 414fcb 47800->47801 47802 401e65 22 API calls 47801->47802 47803 414fd4 47802->47803 47804 4020f6 28 API calls 47803->47804 47805 414fdf 47804->47805 47806 41beac 28 API calls 47805->47806 47807 414fe7 47806->47807 48509 40489e WSAStartup 47807->48509 47809 414ff1 47810 401e65 22 API calls 47809->47810 47811 414ffa 47810->47811 47812 401e65 22 API calls 47811->47812 47839 415079 47811->47839 47813 415013 47812->47813 47815 401e65 22 API calls 47813->47815 47814 4020f6 28 API calls 47814->47839 47816 415024 47815->47816 47818 401e65 22 API calls 47816->47818 47817 41beac 28 API calls 47817->47839 47819 415035 47818->47819 47820 401e65 22 API calls 47819->47820 47822 415046 47820->47822 47821 406c59 28 API calls 47821->47839 47825 401e65 22 API calls 47822->47825 47823 402f10 28 API calls 47823->47839 47824 401fe2 28 API calls 47824->47839 47826 415057 47825->47826 47828 401e65 22 API calls 47826->47828 47827 401fd8 11 API calls 47827->47839 47829 415069 47828->47829 48611 40473d 89 API calls 47829->48611 47831 40531e 28 API calls 47831->47839 47832 406383 28 API calls 47832->47839 47834 4151c7 WSAGetLastError 48612 41cb72 30 API calls 47834->48612 47839->47814 47839->47817 47839->47821 47839->47823 47839->47824 47839->47827 47839->47831 47839->47832 47839->47834 47841 41b580 80 API calls 47839->47841 47843 401e65 22 API calls 47839->47843 47844 401e8d 11 API calls 47839->47844 47845 43bb2c _strftime 40 API calls 47839->47845 47847 402093 28 API calls 47839->47847 47850 409097 28 API calls 47839->47850 47853 4135e1 31 API calls 47839->47853 47865 4153f6 47839->47865 48510 414f24 47839->48510 48515 40482d 47839->48515 48522 404f51 47839->48522 48537 4048c8 connect 47839->48537 48597 404e26 WaitForSingleObject 47839->48597 48613 4052fd 28 API calls 47839->48613 48614 41b871 GlobalMemoryStatusEx 47839->48614 48615 4145f8 51 API calls 47839->48615 48616 441ed1 20 API calls 47839->48616 48617 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47839->48617 47841->47839 47843->47839 47844->47839 47846 415b0a Sleep 47845->47846 47846->47839 47847->47839 47850->47839 47853->47839 47854 40417e 28 API calls 47854->47865 47857 41bdaf 28 API calls 47857->47865 47858 41bc1f 28 API calls 47858->47865 47859 401e65 22 API calls 47860 415474 GetTickCount 47859->47860 48620 41bc1f 28 API calls 47860->48620 47865->47839 47865->47854 47865->47857 47865->47858 47865->47859 47867 402ea1 28 API calls 47865->47867 47868 402f10 28 API calls 47865->47868 47869 406383 28 API calls 47865->47869 47871 401fd8 11 API calls 47865->47871 47874 402093 28 API calls 47865->47874 47875 41b580 80 API calls 47865->47875 47876 415aac CreateThread 47865->47876 47877 401f09 11 API calls 47865->47877 48618 40ddc4 6 API calls 47865->48618 48619 41bcd3 28 API calls 47865->48619 48621 41bb77 GetLastInputInfo GetTickCount 47865->48621 48622 41bb27 30 API calls ___scrt_get_show_window_mode 47865->48622 48623 40f90c 29 API calls 47865->48623 48624 402f31 28 API calls 47865->48624 48625 404aa1 61 API calls _Yarn 47865->48625 48626 404c10 113 API calls _Yarn 47865->48626 48627 40b08c 85 API calls 47865->48627 47867->47865 47868->47865 47869->47865 47871->47865 47874->47865 47875->47865 47876->47865 48652 41ada8 106 API calls 47876->48652 47877->47865 47878->47280 47879->47287 47880->47292 47883 4020df 11 API calls 47882->47883 47884 406c65 47883->47884 47885 4032a0 28 API calls 47884->47885 47886 406c82 47885->47886 47886->47313 47888 40ebdf 47887->47888 47889 4135ae RegQueryValueExA RegCloseKey 47887->47889 47888->47310 47888->47327 47889->47888 47890->47317 47891->47346 47892->47338 47893->47330 47894->47345 47896 401f86 11 API calls 47895->47896 47897 40da8b 47896->47897 47898 40dae0 47897->47898 47899 40daab 47897->47899 47901 40daa1 47897->47901 47902 41c048 2 API calls 47898->47902 48653 41b645 29 API calls 47899->48653 47900 40dbd4 GetLongPathNameW 47904 40417e 28 API calls 47900->47904 47901->47900 47905 40dae5 47902->47905 47907 40dbe9 47904->47907 47908 40dae9 47905->47908 47909 40db3b 47905->47909 47906 40dab4 47910 401f13 28 API calls 47906->47910 47911 40417e 28 API calls 47907->47911 47913 40417e 28 API calls 47908->47913 47912 40417e 28 API calls 47909->47912 47914 40dabe 47910->47914 47915 40dbf8 47911->47915 47916 40db49 47912->47916 47917 40daf7 47913->47917 47918 401f09 11 API calls 47914->47918 48656 40de0c 28 API calls 47915->48656 47922 40417e 28 API calls 47916->47922 47923 40417e 28 API calls 47917->47923 47918->47901 47920 40dc0b 48657 402fa5 28 API calls 47920->48657 47925 40db5f 47922->47925 47926 40db0d 47923->47926 47924 40dc16 48658 402fa5 28 API calls 47924->48658 48655 402fa5 28 API calls 47925->48655 48654 402fa5 28 API calls 47926->48654 47930 40db18 47934 401f13 28 API calls 47930->47934 47931 40dc20 47935 401f09 11 API calls 47931->47935 47932 40db6a 47933 401f13 28 API calls 47932->47933 47936 40db75 47933->47936 47937 40db23 47934->47937 47938 40dc2a 47935->47938 47940 401f09 11 API calls 47936->47940 47941 401f09 11 API calls 47937->47941 47939 401f09 11 API calls 47938->47939 47942 40dc33 47939->47942 47943 40db7e 47940->47943 47944 40db2c 47941->47944 47945 401f09 11 API calls 47942->47945 47946 401f09 11 API calls 47943->47946 47947 401f09 11 API calls 47944->47947 47948 40dc3c 47945->47948 47946->47914 47947->47914 47949 401f09 11 API calls 47948->47949 47950 40dc45 47949->47950 47951 401f09 11 API calls 47950->47951 47952 40dc4e 47951->47952 47952->47404 47953->47416 47954->47438 47955->47397 47956->47430 47963 434563 47957->47963 47958 43bda0 _Yarn 21 API calls 47958->47963 47959 40f10c 47959->47469 47963->47958 47963->47959 48659 443001 7 API calls 2 library calls 47963->48659 48660 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47963->48660 48661 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47963->48661 47964->47500 47965->47487 47967->47532 47968->47335 47971 41b556 LoadResource LockResource SizeofResource 47970->47971 47972 40f419 47970->47972 47971->47972 47973 43bda0 47972->47973 47978 4461b8 __Getctype 47973->47978 47974 4461f6 47990 44062d 20 API calls _Atexit 47974->47990 47975 4461e1 RtlAllocateHeap 47977 4461f4 47975->47977 47975->47978 47977->47567 47978->47974 47978->47975 47989 443001 7 API calls 2 library calls 47978->47989 47981 4020bf 47980->47981 47991 4023ce 47981->47991 47983 4020ca 47995 40250a 47983->47995 47985 4020d9 47985->47570 47987 4020b7 28 API calls 47986->47987 47988 406e27 47987->47988 47988->47577 47989->47978 47990->47977 47992 4023d8 47991->47992 47993 402428 47991->47993 47992->47993 48002 4027a7 11 API calls std::_Deallocate 47992->48002 47993->47983 47996 40251a 47995->47996 47997 402520 47996->47997 47998 402535 47996->47998 48003 402569 47997->48003 48013 4028e8 47998->48013 48001 402533 48001->47985 48002->47993 48024 402888 48003->48024 48005 40257d 48006 402592 48005->48006 48007 4025a7 48005->48007 48029 402a34 22 API calls 48006->48029 48009 4028e8 28 API calls 48007->48009 48011 4025a5 48009->48011 48010 40259b 48030 4029da 22 API calls 48010->48030 48011->48001 48014 4028f1 48013->48014 48015 402953 48014->48015 48016 4028fb 48014->48016 48038 4028a4 22 API calls 48015->48038 48019 402904 48016->48019 48020 402917 48016->48020 48032 402cae 48019->48032 48021 402915 48020->48021 48023 4023ce 11 API calls 48020->48023 48021->48001 48023->48021 48025 402890 48024->48025 48026 402898 48025->48026 48031 402ca3 22 API calls 48025->48031 48026->48005 48029->48010 48030->48011 48033 402cb8 __EH_prolog 48032->48033 48039 402e54 22 API calls 48033->48039 48035 4023ce 11 API calls 48037 402d92 48035->48037 48036 402d24 48036->48035 48037->48021 48039->48036 48041 4020e7 48040->48041 48042 4023ce 11 API calls 48041->48042 48043 4020f2 48042->48043 48043->47605 48044->47605 48045->47605 48046->47595 48047->47586 48048->47609 48049->47613 48050->47615 48053 4032aa 48052->48053 48054 4028e8 28 API calls 48053->48054 48055 4032c9 48053->48055 48054->48055 48055->47625 48057 4051fb 48056->48057 48066 405274 48057->48066 48059 405208 48059->47628 48061 402061 48060->48061 48062 4023ce 11 API calls 48061->48062 48063 40207b 48062->48063 48088 40267a 48063->48088 48067 405282 48066->48067 48068 405288 48067->48068 48069 40529e 48067->48069 48077 4025f0 48068->48077 48071 4052f5 48069->48071 48072 4052b6 48069->48072 48086 4028a4 22 API calls 48071->48086 48075 4028e8 28 API calls 48072->48075 48076 40529c 48072->48076 48075->48076 48076->48059 48078 402888 22 API calls 48077->48078 48079 402602 48078->48079 48080 402672 48079->48080 48081 402629 48079->48081 48087 4028a4 22 API calls 48080->48087 48084 4028e8 28 API calls 48081->48084 48085 40263b 48081->48085 48084->48085 48085->48076 48089 40268b 48088->48089 48090 4023ce 11 API calls 48089->48090 48091 40208d 48090->48091 48091->47631 48092->47639 48093->47644 48096 41b362 48095->48096 48097 41c055 GetCurrentProcess IsWow64Process 48095->48097 48099 4135e1 RegOpenKeyExA 48096->48099 48097->48096 48098 41c06c 48097->48098 48098->48096 48100 41360f RegQueryValueExA RegCloseKey 48099->48100 48101 413639 48099->48101 48100->48101 48102 402093 28 API calls 48101->48102 48103 41364e 48102->48103 48103->47655 48104->47663 48106 40b947 48105->48106 48111 402252 48106->48111 48108 40b952 48115 40b967 48108->48115 48110 40b961 48110->47674 48112 4022ac 48111->48112 48113 40225c 48111->48113 48112->48108 48113->48112 48122 402779 11 API calls std::_Deallocate 48113->48122 48116 40b9a1 48115->48116 48117 40b973 48115->48117 48134 4028a4 22 API calls 48116->48134 48123 4027e6 48117->48123 48121 40b97d 48121->48110 48122->48112 48124 4027ef 48123->48124 48125 402851 48124->48125 48126 4027f9 48124->48126 48136 4028a4 22 API calls 48125->48136 48129 402802 48126->48129 48131 402815 48126->48131 48135 402aea 28 API calls __EH_prolog 48129->48135 48132 402813 48131->48132 48133 402252 11 API calls 48131->48133 48132->48121 48133->48132 48135->48132 48137->47683 48139 402347 48138->48139 48140 402252 11 API calls 48139->48140 48141 4023c7 48140->48141 48141->47683 48143 4024f9 48142->48143 48144 40250a 28 API calls 48143->48144 48145 4020b1 48144->48145 48145->47410 48162 43ba8a 48146->48162 48148 43aed0 48168 43a837 36 API calls 2 library calls 48148->48168 48150 43ae95 48150->48148 48151 43aeaa 48150->48151 48153 43aeaf pre_c_initialization 48150->48153 48167 44062d 20 API calls _Atexit 48151->48167 48153->47712 48155 43aedc 48157 43af0b 48155->48157 48169 43bacf 40 API calls __Toupper 48155->48169 48159 43af77 48157->48159 48170 43ba36 20 API calls 2 library calls 48157->48170 48171 43ba36 20 API calls 2 library calls 48159->48171 48160 43b03e _strftime 48160->48153 48172 44062d 20 API calls _Atexit 48160->48172 48163 43baa2 48162->48163 48164 43ba8f 48162->48164 48163->48150 48173 44062d 20 API calls _Atexit 48164->48173 48166 43ba94 pre_c_initialization 48166->48150 48167->48153 48168->48155 48169->48155 48170->48159 48171->48160 48172->48153 48173->48166 48180 401fb0 48174->48180 48176 402f1e 48177 402055 11 API calls 48176->48177 48178 402f2d 48177->48178 48178->47726 48179->47729 48181 4025f0 28 API calls 48180->48181 48182 401fbd 48181->48182 48182->48176 48184 40a162 48183->48184 48185 413584 3 API calls 48184->48185 48186 40a169 48185->48186 48187 40a197 48186->48187 48188 40a17d 48186->48188 48204 409097 48187->48204 48190 40a182 48188->48190 48191 409ed6 48188->48191 48193 409097 28 API calls 48190->48193 48191->47461 48195 40a190 48193->48195 48232 40a268 29 API calls 48195->48232 48197 40a195 48197->48191 48198->47754 48371 403222 48199->48371 48201 403022 48375 403262 48201->48375 48205 4090ad 48204->48205 48206 402252 11 API calls 48205->48206 48207 4090c7 48206->48207 48233 404267 48207->48233 48209 4090d5 48210 40a1b4 48209->48210 48245 40b927 48210->48245 48213 40a205 48216 402093 28 API calls 48213->48216 48214 40a1dd 48215 402093 28 API calls 48214->48215 48217 40a1e7 48215->48217 48218 40a210 48216->48218 48219 41bcef 28 API calls 48217->48219 48220 402093 28 API calls 48218->48220 48221 40a1f5 48219->48221 48222 40a21f 48220->48222 48249 40b19f 31 API calls _Yarn 48221->48249 48224 41b580 80 API calls 48222->48224 48226 40a224 CreateThread 48224->48226 48225 40a1fc 48227 401fd8 11 API calls 48225->48227 48228 40a24b CreateThread 48226->48228 48229 40a23f CreateThread 48226->48229 48257 40a2b8 48226->48257 48227->48213 48230 401f09 11 API calls 48228->48230 48254 40a2c4 48228->48254 48229->48228 48251 40a2a2 48229->48251 48231 40a25f 48230->48231 48231->48191 48232->48197 48370 40a2ae 164 API calls 48232->48370 48234 402888 22 API calls 48233->48234 48235 40427b 48234->48235 48236 404290 48235->48236 48237 4042a5 48235->48237 48243 4042df 22 API calls 48236->48243 48239 4027e6 28 API calls 48237->48239 48242 4042a3 48239->48242 48240 404299 48244 402c48 22 API calls 48240->48244 48242->48209 48243->48240 48244->48242 48246 40b930 48245->48246 48247 40a1d2 48245->48247 48250 40b9a7 28 API calls 48246->48250 48247->48213 48247->48214 48249->48225 48250->48247 48260 40a2f3 48251->48260 48277 40ad11 48254->48277 48320 40a761 48257->48320 48261 40a30c GetModuleHandleA SetWindowsHookExA 48260->48261 48262 40a36e GetMessageA 48260->48262 48261->48262 48263 40a328 GetLastError 48261->48263 48264 40a380 TranslateMessage DispatchMessageA 48262->48264 48265 40a2ab 48262->48265 48275 41bc1f 28 API calls 48263->48275 48264->48262 48264->48265 48267 40a339 48276 4052fd 28 API calls 48267->48276 48275->48267 48284 40ad1f 48277->48284 48278 40a2cd 48279 40ad79 Sleep GetForegroundWindow GetWindowTextLengthW 48281 40b93f 28 API calls 48279->48281 48281->48284 48284->48278 48284->48279 48287 40adbf GetWindowTextW 48284->48287 48290 40add9 48284->48290 48307 43445a EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait 48284->48307 48308 401f86 48284->48308 48312 434801 23 API calls __onexit 48284->48312 48313 43441b SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_wait 48284->48313 48286 41bb77 GetLastInputInfo GetTickCount 48286->48290 48287->48284 48289 401f09 11 API calls 48289->48290 48290->48284 48290->48286 48290->48289 48291 40af17 48290->48291 48292 40b927 28 API calls 48290->48292 48294 40ae84 Sleep 48290->48294 48297 402093 28 API calls 48290->48297 48300 409097 28 API calls 48290->48300 48301 403014 28 API calls 48290->48301 48302 406383 28 API calls 48290->48302 48304 40a671 12 API calls 48290->48304 48305 41bcef 28 API calls 48290->48305 48306 401fd8 11 API calls 48290->48306 48314 40907f 28 API calls 48290->48314 48315 40b19f 31 API calls _Yarn 48290->48315 48316 40b9b7 28 API calls 48290->48316 48317 40b783 40 API calls 2 library calls 48290->48317 48318 441ed1 20 API calls 48290->48318 48319 4052fd 28 API calls 48290->48319 48293 401f09 11 API calls 48291->48293 48292->48290 48293->48278 48294->48290 48297->48290 48300->48290 48301->48290 48302->48290 48304->48290 48305->48290 48306->48290 48309 401f8e 48308->48309 48310 402252 11 API calls 48309->48310 48311 401f99 48310->48311 48311->48284 48312->48284 48313->48284 48314->48290 48315->48290 48316->48290 48317->48290 48318->48290 48321 40a776 Sleep 48320->48321 48344 40a6b0 48321->48344 48323 40a2c1 48324 40a7b6 CreateDirectoryW 48343 40a788 48324->48343 48325 40a7c7 GetFileAttributesW 48325->48343 48326 40a7de SetFileAttributesW 48326->48343 48327 4020df 11 API calls 48327->48343 48329 40a858 PathFileExistsW 48338 40a863 48329->48338 48329->48343 48330 401e65 22 API calls 48330->48343 48331 4020df 11 API calls 48331->48338 48333 4020b7 28 API calls 48333->48343 48334 40a961 SetFileAttributesW 48334->48343 48335 401fd8 11 API calls 48335->48343 48336 401fd8 11 API calls 48336->48343 48337 406e13 28 API calls 48337->48338 48338->48331 48338->48335 48338->48337 48339 401fe2 28 API calls 48338->48339 48341 401fd8 11 API calls 48338->48341 48367 41c516 32 API calls 48338->48367 48339->48338 48340 406e13 28 API calls 48340->48343 48341->48338 48343->48321 48343->48323 48343->48324 48343->48325 48343->48326 48343->48327 48343->48329 48343->48330 48343->48333 48343->48334 48343->48336 48343->48340 48357 41c482 48343->48357 48368 41c583 CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 48343->48368 48345 40a75d 48344->48345 48348 40a6c6 48344->48348 48345->48343 48346 40a6e5 CreateFileW 48347 40a6f3 GetFileSize 48346->48347 48346->48348 48347->48348 48349 40a728 CloseHandle 48347->48349 48348->48346 48348->48349 48350 40a73a 48348->48350 48351 40a716 48348->48351 48352 40a71d Sleep 48348->48352 48349->48348 48350->48345 48354 409097 28 API calls 48350->48354 48369 40b117 84 API calls 48351->48369 48352->48349 48355 40a756 48354->48355 48356 40a1b4 125 API calls 48355->48356 48356->48345 48358 41c495 CreateFileW 48357->48358 48360 41c4d2 48358->48360 48361 41c4ce 48358->48361 48362 41c4f2 WriteFile 48360->48362 48363 41c4d9 SetFilePointer 48360->48363 48361->48343 48365 41c505 48362->48365 48366 41c507 CloseHandle 48362->48366 48363->48362 48364 41c4e9 CloseHandle 48363->48364 48364->48361 48365->48366 48366->48361 48367->48338 48368->48343 48369->48352 48372 40322e 48371->48372 48381 403618 48372->48381 48374 40323b 48374->48201 48376 40326e 48375->48376 48377 402252 11 API calls 48376->48377 48378 403288 48377->48378 48379 402336 11 API calls 48378->48379 48380 403031 48379->48380 48380->47759 48382 403626 48381->48382 48383 403644 48382->48383 48384 40362c 48382->48384 48386 40365c 48383->48386 48387 40369e 48383->48387 48392 4036a6 28 API calls 48384->48392 48388 403642 48386->48388 48391 4027e6 28 API calls 48386->48391 48393 4028a4 22 API calls 48387->48393 48388->48374 48391->48388 48392->48388 48395 404186 48394->48395 48396 402252 11 API calls 48395->48396 48397 404191 48396->48397 48405 4041bc 48397->48405 48400 4042fc 48416 404353 48400->48416 48402 40430a 48403 403262 11 API calls 48402->48403 48404 404319 48403->48404 48404->47767 48406 4041c8 48405->48406 48409 4041d9 48406->48409 48408 40419c 48408->48400 48410 4041e9 48409->48410 48411 404206 48410->48411 48412 4041ef 48410->48412 48413 4027e6 28 API calls 48411->48413 48414 404267 28 API calls 48412->48414 48415 404204 48413->48415 48414->48415 48415->48408 48417 40435f 48416->48417 48420 404371 48417->48420 48419 40436d 48419->48402 48421 40437f 48420->48421 48422 404385 48421->48422 48423 40439e 48421->48423 48486 4034e6 28 API calls 48422->48486 48424 402888 22 API calls 48423->48424 48425 4043a6 48424->48425 48427 404419 48425->48427 48428 4043bf 48425->48428 48487 4028a4 22 API calls 48427->48487 48430 4027e6 28 API calls 48428->48430 48439 40439c 48428->48439 48430->48439 48439->48419 48486->48439 48494 43ab1a 48488->48494 48492 4138ca RegSetValueExA RegCloseKey 48491->48492 48493 4138f4 48491->48493 48492->48493 48493->47783 48497 43aa9b 48494->48497 48496 40170d 48496->47785 48498 43aaaa 48497->48498 48499 43aabe 48497->48499 48503 44062d 20 API calls _Atexit 48498->48503 48502 43aaaf pre_c_initialization __alldvrm 48499->48502 48504 4489d7 11 API calls 2 library calls 48499->48504 48502->48496 48503->48502 48504->48502 48508 41b98a _Yarn ___scrt_get_show_window_mode 48505->48508 48506 402093 28 API calls 48507 414f84 48506->48507 48507->47792 48508->48506 48509->47809 48511 414f33 48510->48511 48512 414f3d getaddrinfo WSASetLastError 48510->48512 48628 414dc1 29 API calls ___std_exception_copy 48511->48628 48512->47839 48514 414f38 48514->48512 48516 404846 socket 48515->48516 48517 404839 48515->48517 48519 404860 CreateEventW 48516->48519 48520 404842 48516->48520 48629 40489e WSAStartup 48517->48629 48519->47839 48520->47839 48521 40483e 48521->48516 48521->48520 48523 404f65 48522->48523 48524 404fea 48522->48524 48525 404f6e 48523->48525 48526 404fc0 CreateEventA CreateThread 48523->48526 48527 404f7d GetLocalTime 48523->48527 48524->47839 48525->48526 48526->48524 48632 405150 48526->48632 48630 41bc1f 28 API calls 48527->48630 48529 404f91 48631 4052fd 28 API calls 48529->48631 48538 404a1b 48537->48538 48539 4048ee 48537->48539 48540 404a21 WSAGetLastError 48538->48540 48541 40497e 48538->48541 48539->48541 48543 40531e 28 API calls 48539->48543 48561 404923 48539->48561 48540->48541 48542 404a31 48540->48542 48541->47839 48544 404a36 48542->48544 48549 404932 48542->48549 48546 40490f 48543->48546 48647 41cb72 30 API calls 48544->48647 48550 402093 28 API calls 48546->48550 48548 40492b 48548->48549 48552 404941 48548->48552 48553 402093 28 API calls 48549->48553 48555 40491e 48550->48555 48551 404a40 48648 4052fd 28 API calls 48551->48648 48563 404950 48552->48563 48564 404987 48552->48564 48554 404a80 48553->48554 48557 402093 28 API calls 48554->48557 48558 41b580 80 API calls 48555->48558 48560 404a8f 48557->48560 48558->48561 48565 41b580 80 API calls 48560->48565 48636 420cf1 27 API calls 48561->48636 48568 402093 28 API calls 48563->48568 48644 421ad1 54 API calls 48564->48644 48565->48541 48571 40495f 48568->48571 48570 40498f 48574 4049c4 48570->48574 48575 404994 48570->48575 48572 402093 28 API calls 48571->48572 48576 40496e 48572->48576 48646 420e97 28 API calls 48574->48646 48579 402093 28 API calls 48575->48579 48580 41b580 80 API calls 48576->48580 48582 4049a3 48579->48582 48583 404973 48580->48583 48581 4049cc 48584 4049f9 CreateEventW CreateEventW 48581->48584 48586 402093 28 API calls 48581->48586 48585 402093 28 API calls 48582->48585 48637 420d31 48583->48637 48584->48541 48587 4049b2 48585->48587 48589 4049e2 48586->48589 48590 41b580 80 API calls 48587->48590 48592 402093 28 API calls 48589->48592 48591 4049b7 48590->48591 48645 421143 52 API calls 48591->48645 48594 4049f1 48592->48594 48595 41b580 80 API calls 48594->48595 48596 4049f6 48595->48596 48596->48584 48598 404e40 SetEvent CloseHandle 48597->48598 48599 404e57 closesocket 48597->48599 48600 404ed8 48598->48600 48601 404e64 48599->48601 48600->47839 48602 404e73 48601->48602 48603 404e7a 48601->48603 48651 4050e4 84 API calls 48602->48651 48605 404e8c WaitForSingleObject 48603->48605 48606 404ece SetEvent CloseHandle 48603->48606 48607 420d31 3 API calls 48605->48607 48606->48600 48608 404e9b SetEvent WaitForSingleObject 48607->48608 48609 420d31 3 API calls 48608->48609 48610 404eb3 SetEvent CloseHandle CloseHandle 48609->48610 48610->48606 48611->47839 48612->47839 48614->47839 48615->47839 48616->47839 48617->47839 48618->47865 48619->47865 48620->47865 48621->47865 48622->47865 48623->47865 48624->47865 48625->47865 48626->47865 48627->47865 48628->48514 48629->48521 48630->48529 48635 40515c 102 API calls 48632->48635 48634 405159 48635->48634 48636->48548 48638 41e7a2 48637->48638 48639 420d39 48637->48639 48640 41e7b0 48638->48640 48649 41d8ec DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48638->48649 48639->48541 48650 41e4d2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48640->48650 48643 41e7b7 48644->48570 48645->48583 48646->48581 48647->48551 48649->48640 48650->48643 48651->48603 48653->47906 48654->47930 48655->47932 48656->47920 48657->47924 48658->47931 48659->47963 48664 40f7fd 48662->48664 48663 413584 3 API calls 48663->48664 48664->48663 48665 40f82f 48664->48665 48666 40f8a1 48664->48666 48668 40f891 Sleep 48664->48668 48667 409097 28 API calls 48665->48667 48665->48668 48671 41bcef 28 API calls 48665->48671 48677 401f09 11 API calls 48665->48677 48681 402093 28 API calls 48665->48681 48684 4137aa 14 API calls 48665->48684 48695 40d0d1 112 API calls ___scrt_get_show_window_mode 48665->48695 48696 41384f 14 API calls 48665->48696 48669 409097 28 API calls 48666->48669 48667->48665 48668->48664 48672 40f8ac 48669->48672 48671->48665 48673 41bcef 28 API calls 48672->48673 48674 40f8b8 48673->48674 48697 41384f 14 API calls 48674->48697 48677->48665 48678 40f8cb 48679 401f09 11 API calls 48678->48679 48680 40f8d7 48679->48680 48682 402093 28 API calls 48680->48682 48681->48665 48683 40f8e8 48682->48683 48685 4137aa 14 API calls 48683->48685 48684->48665 48686 40f8fb 48685->48686 48698 41288b TerminateProcess WaitForSingleObject 48686->48698 48688 40f903 ExitProcess 48699 412829 62 API calls 48690->48699 48696->48665 48697->48678 48698->48688 48700 42f97e 48701 42f989 48700->48701 48702 42f99d 48701->48702 48704 432f7f 48701->48704 48705 432f8a 48704->48705 48706 432f8e 48704->48706 48705->48702 48708 440f5d 48706->48708 48709 446206 48708->48709 48710 446213 48709->48710 48711 44621e 48709->48711 48721 4461b8 48710->48721 48713 446226 48711->48713 48719 44622f __Getctype 48711->48719 48728 446802 20 API calls _free 48713->48728 48714 446234 48729 44062d 20 API calls _Atexit 48714->48729 48715 446259 HeapReAlloc 48718 44621b 48715->48718 48715->48719 48718->48705 48719->48714 48719->48715 48730 443001 7 API calls 2 library calls 48719->48730 48722 4461f6 48721->48722 48723 4461c6 __Getctype 48721->48723 48732 44062d 20 API calls _Atexit 48722->48732 48723->48722 48724 4461e1 RtlAllocateHeap 48723->48724 48731 443001 7 API calls 2 library calls 48723->48731 48724->48723 48726 4461f4 48724->48726 48726->48718 48728->48718 48729->48718 48730->48719 48731->48723 48732->48726 48733 40165e 48734 401666 48733->48734 48735 401669 48733->48735 48736 4016a8 48735->48736 48739 401696 48735->48739 48737 43455e new 22 API calls 48736->48737 48738 40169c 48737->48738 48740 43455e new 22 API calls 48739->48740 48740->48738 48741 426cdc 48746 426d59 send 48741->48746 48747 41e04e 48748 41e063 _Yarn ___scrt_get_show_window_mode 48747->48748 48750 432f55 21 API calls 48748->48750 48760 41e266 48748->48760 48754 41e213 ___scrt_get_show_window_mode 48750->48754 48751 41e277 48752 41e21a 48751->48752 48762 432f55 48751->48762 48754->48752 48755 432f55 21 API calls 48754->48755 48758 41e240 ___scrt_get_show_window_mode 48755->48758 48756 41e2b0 ___scrt_get_show_window_mode 48756->48752 48767 4335db 48756->48767 48758->48752 48759 432f55 21 API calls 48758->48759 48759->48760 48760->48752 48761 41dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 48760->48761 48761->48751 48763 432f63 48762->48763 48764 432f5f 48762->48764 48765 43bda0 _Yarn 21 API calls 48763->48765 48764->48756 48766 432f68 48765->48766 48766->48756 48770 4334fa 48767->48770 48769 4335e3 48769->48752 48771 433513 48770->48771 48775 433509 48770->48775 48772 432f55 21 API calls 48771->48772 48771->48775 48773 433534 48772->48773 48773->48775 48776 4338c8 CryptAcquireContextA 48773->48776 48775->48769 48777 4338e4 48776->48777 48778 4338e9 CryptGenRandom 48776->48778 48777->48775 48778->48777 48779 4338fe CryptReleaseContext 48778->48779 48779->48777 48780 426c6d 48786 426d42 recv 48780->48786

                                Control-flow Graph

                                APIs
                                • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad$HandleModule
                                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                • API String ID: 4236061018-3687161714
                                • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 100 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->100 79 40ec06-40ec25 call 401fab call 413584 70->79 80 40ec3e-40ec45 call 40d0a4 70->80 79->80 98 40ec27-40ec3d call 401fab call 4139e4 79->98 88 40ec47-40ec49 80->88 89 40ec4e-40ec55 80->89 92 40ef2c 88->92 93 40ec57 89->93 94 40ec59-40ec65 call 41b354 89->94 92->49 93->94 104 40ec67-40ec69 94->104 105 40ec6e-40ec72 94->105 98->80 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 100->126 104->105 108 40ecb1-40ecc4 call 401e65 call 401fab 105->108 109 40ec74 call 407751 105->109 127 40ecc6 call 407790 108->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->128 118 40ec79-40ec7b 109->118 120 40ec87-40ec9a call 401e65 call 401fab 118->120 121 40ec7d-40ec82 call 407773 call 40729b 118->121 120->108 141 40ec9c-40eca2 120->141 121->120 156 40f3e0-40f3ea call 40dd7d call 414f65 126->156 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 141->108 144 40eca4-40ecaa 141->144 144->108 147 40ecac call 40729b 144->147 147->108 177->178 203 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->203 179 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->179 180 40edc5-40edcc 178->180 234 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 179->234 182 40ee4a-40ee54 call 409092 180->182 183 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 180->183 193 40ee59-40ee7d call 40247c call 434829 182->193 183->193 211 40ee8c 193->211 212 40ee7f-40ee8a call 436f10 193->212 203->178 217 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 211->217 212->217 271 40eede-40ef03 call 434832 call 401e65 call 40b9f8 217->271 286 40f017-40f019 234->286 287 40effc 234->287 271->234 288 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 271->288 290 40f01b-40f01d 286->290 291 40f01f 286->291 289 40effe-40f015 call 41ce2c CreateThread 287->289 288->234 306 40ef2a 288->306 294 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 289->294 290->289 291->294 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 294->344 345 40f13c 294->345 306->92 346 40f13e-40f156 call 401e65 call 401fab 344->346 345->346 356 40f194-40f1a7 call 401e65 call 401fab 346->356 357 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 346->357 367 40f207-40f21a call 401e65 call 401fab 356->367 368 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 356->368 357->356 379 40f255-40f279 call 41b69e call 401f13 call 401f09 367->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 367->380 368->367 400 40f27b-40f27c SetProcessDEPPolicy 379->400 401 40f27e-40f291 CreateThread 379->401 380->379 400->401 404 40f293-40f29d CreateThread 401->404 405 40f29f-40f2a6 401->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 416 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->416 417 40f2c2-40f2c7 413->417 418 40f307-40f31a call 401fab call 41353a 413->418 416->418 417->416 426 40f31f-40f322 418->426 426->156 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 426->427 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                APIs
                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe,00000104), ref: 0040EA29
                                  • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                • String ID: ,aF$,aF$8SG$8SG$Access Level: $Administrator$C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$iphone-SP6UL4$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                • API String ID: 2830904901-3345127900
                                • Opcode ID: 49431b8dd783423accf16740c7d71729371280868a66773ebf6fb8fdb646c024
                                • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                • Opcode Fuzzy Hash: 49431b8dd783423accf16740c7d71729371280868a66773ebf6fb8fdb646c024
                                • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1277 40a2f3-40a30a 1278 40a30c-40a326 GetModuleHandleA SetWindowsHookExA 1277->1278 1279 40a36e-40a37e GetMessageA 1277->1279 1278->1279 1280 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1278->1280 1281 40a380-40a398 TranslateMessage DispatchMessageA 1279->1281 1282 40a39a 1279->1282 1283 40a39c-40a3a1 1280->1283 1281->1279 1281->1282 1282->1283
                                APIs
                                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                • GetLastError.KERNEL32 ref: 0040A328
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                • TranslateMessage.USER32(?), ref: 0040A385
                                • DispatchMessageA.USER32(?), ref: 0040A390
                                Strings
                                • Keylogger initialization failure: error , xrefs: 0040A33C
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                • String ID: Keylogger initialization failure: error
                                • API String ID: 3219506041-952744263
                                • Opcode ID: 90b0715fe4a03c7950091ea493cf6ac8be3b9c9bd1286eec6a190886210d1988
                                • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                • Opcode Fuzzy Hash: 90b0715fe4a03c7950091ea493cf6ac8be3b9c9bd1286eec6a190886210d1988
                                • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                  • Part of subcall function 00413584: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                  • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                                • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                • ExitProcess.KERNEL32 ref: 0040F905
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseExitOpenProcessQuerySleepValue
                                • String ID: 5.1.3 Pro$override$pth_unenc
                                • API String ID: 2281282204-1392497409
                                • Opcode ID: 63a879446c8ff419ef4e70c844bd481c765728b91b26e4cfc9b1ce748e39a5f9
                                • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                • Opcode Fuzzy Hash: 63a879446c8ff419ef4e70c844bd481c765728b91b26e4cfc9b1ce748e39a5f9
                                • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1426 404f51-404f5f 1427 404f65-404f6c 1426->1427 1428 404fea 1426->1428 1430 404f74-404f7b 1427->1430 1431 404f6e-404f72 1427->1431 1429 404fec-404ff1 1428->1429 1432 404fc0-404fe8 CreateEventA CreateThread 1430->1432 1433 404f7d-404fbb GetLocalTime call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1430->1433 1431->1432 1432->1429 1433->1432
                                APIs
                                • GetLocalTime.KERNEL32(?), ref: 00404F81
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                Strings
                                • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Create$EventLocalThreadTime
                                • String ID: KeepAlive | Enabled | Timeout:
                                • API String ID: 2532271599-1507639952
                                • Opcode ID: d6bdf093f7aea2e5024bc4ba9810f3b5686ab9589db354a71a8a5fd0b8ad62b9
                                • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                • Opcode Fuzzy Hash: d6bdf093f7aea2e5024bc4ba9810f3b5686ab9589db354a71a8a5fd0b8ad62b9
                                • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                APIs
                                • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,005C4820), ref: 004338DA
                                • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Crypt$Context$AcquireRandomRelease
                                • String ID:
                                • API String ID: 1815803762-0
                                • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                APIs
                                • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B6BB
                                • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Name$ComputerUser
                                • String ID:
                                • API String ID: 4229901323-0
                                • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: recv
                                • String ID:
                                • API String ID: 1507349165-0
                                • Opcode ID: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                • Instruction ID: c63eaffdb417a6470c671315a396a42075a312041b5b8b5670d44767818a4bbd
                                • Opcode Fuzzy Hash: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                • Instruction Fuzzy Hash: 26B09279108202FFCA150B60CC0886ABEA6ABC8382B00882DB586411B0C736C851AB26

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 448 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 461 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 448->461 462 414faf-414fb6 Sleep 448->462 477 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->477 478 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->478 462->461 477->478 531 415127-41512e 478->531 532 415119-415125 478->532 533 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 531->533 532->533 560 415210-41521e call 40482d 533->560 561 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 533->561 566 415220-415246 call 402093 * 2 call 41b580 560->566 567 41524b-415259 call 404f51 call 4048c8 560->567 583 415ade-415af0 call 404e26 call 4021fa 561->583 566->583 579 41525e-415260 567->579 582 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 579->582 579->583 648 4153bb-4153c8 call 405aa6 582->648 649 4153cd-4153f4 call 401fab call 4135e1 582->649 597 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 583->597 598 415b18-415b20 call 401e8d 583->598 597->598 598->478 648->649 655 4153f6-4153f8 649->655 656 4153fb-415a51 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 649->656 655->656 902 415a53-415a5a 656->902 903 415a65-415a6c 656->903 902->903 904 415a5c-415a5e 902->904 905 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 903->905 906 415a6e-415a73 call 40b08c 903->906 904->903 917 415aac-415ab8 CreateThread 905->917 918 415abe-415ad9 call 401fd8 * 2 call 401f09 905->918 906->905 917->918 918->583
                                APIs
                                • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414FB6
                                • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                                • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$ErrorLastLocalTime
                                • String ID: | $%I64u$,aF$5.1.3 Pro$8SG$C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$TLS Off$TLS On $`0_$dMG$hlight$iphone-SP6UL4$name$NG$NG$PG$PG$PG
                                • API String ID: 524882891-1336585704
                                • Opcode ID: 17b944b1b835277ad5605e6f7f563df8fce4a85f4fa63bc7f229c9f4c273a99b
                                • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                                • Opcode Fuzzy Hash: 17b944b1b835277ad5605e6f7f563df8fce4a85f4fa63bc7f229c9f4c273a99b
                                • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                                Control-flow Graph

                                APIs
                                • Sleep.KERNEL32(00001388), ref: 0040A77B
                                  • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                  • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                  • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                  • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                  • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                • String ID: 8SG$8SG$pQG$pQG$xdF$PG$PG
                                • API String ID: 3795512280-661585845
                                • Opcode ID: d85749aa133f1ab7336aaf1fed2db82d76180da0b6c90a408467437cd98988fc
                                • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                • Opcode Fuzzy Hash: d85749aa133f1ab7336aaf1fed2db82d76180da0b6c90a408467437cd98988fc
                                • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1023 4048c8-4048e8 connect 1024 404a1b-404a1f 1023->1024 1025 4048ee-4048f1 1023->1025 1026 404a21-404a2f WSAGetLastError 1024->1026 1027 404a97 1024->1027 1028 404a17-404a19 1025->1028 1029 4048f7-4048fa 1025->1029 1026->1027 1030 404a31-404a34 1026->1030 1031 404a99-404a9e 1027->1031 1028->1031 1032 404926-404930 call 420cf1 1029->1032 1033 4048fc-404923 call 40531e call 402093 call 41b580 1029->1033 1035 404a71-404a76 1030->1035 1036 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1030->1036 1044 404941-40494e call 420f20 1032->1044 1045 404932-40493c 1032->1045 1033->1032 1041 404a7b-404a94 call 402093 * 2 call 41b580 1035->1041 1036->1027 1041->1027 1058 404950-404973 call 402093 * 2 call 41b580 1044->1058 1059 404987-404992 call 421ad1 1044->1059 1045->1041 1084 404976-404982 call 420d31 1058->1084 1070 4049c4-4049d1 call 420e97 1059->1070 1071 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1059->1071 1081 4049d3-4049f6 call 402093 * 2 call 41b580 1070->1081 1082 4049f9-404a14 CreateEventW * 2 1070->1082 1071->1084 1081->1082 1082->1028 1084->1027
                                APIs
                                • connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                • WSAGetLastError.WS2_32 ref: 00404A21
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                • API String ID: 994465650-2151626615
                                • Opcode ID: 7adcd97a12df77eb00c978c8fa497ed471b838c2edee9eb12bf68db0be483499
                                • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                • Opcode Fuzzy Hash: 7adcd97a12df77eb00c978c8fa497ed471b838c2edee9eb12bf68db0be483499
                                • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                                Control-flow Graph

                                APIs
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                • closesocket.WS2_32(000000FF), ref: 00404E5A
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                • String ID:
                                • API String ID: 3658366068-0
                                • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                Control-flow Graph

                                APIs
                                • __Init_thread_footer.LIBCMT ref: 0040AD73
                                • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                • GetForegroundWindow.USER32 ref: 0040AD84
                                • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                  • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                • String ID: [${ User has been idle for $ minutes }$]
                                • API String ID: 911427763-3954389425
                                • Opcode ID: 9c0ea1497b002db213ca3d4c258de7d47da5450525101b72f9826710761d16ec
                                • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                • Opcode Fuzzy Hash: 9c0ea1497b002db213ca3d4c258de7d47da5450525101b72f9826710761d16ec
                                • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1195 40da6f-40da94 call 401f86 1198 40da9a 1195->1198 1199 40dbbe-40dbe4 call 401f04 GetLongPathNameW call 40417e 1195->1199 1201 40dae0-40dae7 call 41c048 1198->1201 1202 40daa1-40daa6 1198->1202 1203 40db93-40db98 1198->1203 1204 40dad6-40dadb 1198->1204 1205 40dba9 1198->1205 1206 40db9a-40db9f call 43c11f 1198->1206 1207 40daab-40dab9 call 41b645 call 401f13 1198->1207 1208 40dacc-40dad1 1198->1208 1209 40db8c-40db91 1198->1209 1220 40dbe9-40dc56 call 40417e call 40de0c call 402fa5 * 2 call 401f09 * 5 1199->1220 1221 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1201->1221 1222 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1201->1222 1211 40dbae-40dbb3 call 43c11f 1202->1211 1203->1211 1204->1211 1205->1211 1217 40dba4-40dba7 1206->1217 1230 40dabe 1207->1230 1208->1211 1209->1211 1223 40dbb4-40dbb9 call 409092 1211->1223 1217->1205 1217->1223 1231 40dac2-40dac7 call 401f09 1221->1231 1222->1230 1223->1199 1230->1231 1231->1199
                                APIs
                                • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LongNamePath
                                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                • API String ID: 82841172-425784914
                                • Opcode ID: 27b408779815cc004e99ecfd0e182e1062e96e4c42aa95a1860903710c88a7ad
                                • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                • Opcode Fuzzy Hash: 27b408779815cc004e99ecfd0e182e1062e96e4c42aa95a1860903710c88a7ad
                                • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1294 41c482-41c493 1295 41c495-41c498 1294->1295 1296 41c4ab-41c4b2 1294->1296 1297 41c4a1-41c4a9 1295->1297 1298 41c49a-41c49f 1295->1298 1299 41c4b3-41c4cc CreateFileW 1296->1299 1297->1299 1298->1299 1300 41c4d2-41c4d7 1299->1300 1301 41c4ce-41c4d0 1299->1301 1303 41c4f2-41c503 WriteFile 1300->1303 1304 41c4d9-41c4e7 SetFilePointer 1300->1304 1302 41c510-41c515 1301->1302 1306 41c505 1303->1306 1307 41c507-41c50e CloseHandle 1303->1307 1304->1303 1305 41c4e9-41c4f0 CloseHandle 1304->1305 1305->1301 1306->1307 1307->1302
                                APIs
                                • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                                • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                                • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                                • CloseHandle.KERNEL32(00000000), ref: 0041C508
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreatePointerWrite
                                • String ID: xpF
                                • API String ID: 1852769593-354647465
                                • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1308 41b354-41b3ab call 41c048 call 4135e1 call 401fe2 call 401fd8 call 406b1c 1319 41b3ad-41b3bc call 4135e1 1308->1319 1320 41b3ee-41b3f7 1308->1320 1325 41b3c1-41b3d8 call 401fab StrToIntA 1319->1325 1321 41b400 1320->1321 1322 41b3f9-41b3fe 1320->1322 1324 41b405-41b410 call 40537d 1321->1324 1322->1324 1330 41b3e6-41b3e9 call 401fd8 1325->1330 1331 41b3da-41b3e3 call 41cffa 1325->1331 1330->1320 1331->1330
                                APIs
                                  • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                  • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                  • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                  • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                  • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCurrentOpenQueryValueWow64
                                • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                • API String ID: 782494840-2070987746
                                • Opcode ID: 8c19a994082f4321bdc384a8b48a1832129d6d8eaa349cc43c026258e8294c9e
                                • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                • Opcode Fuzzy Hash: 8c19a994082f4321bdc384a8b48a1832129d6d8eaa349cc43c026258e8294c9e
                                • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1382 40a6b0-40a6c0 1383 40a6c6-40a6c8 1382->1383 1384 40a75d-40a760 1382->1384 1385 40a6cb-40a6f1 call 401f04 CreateFileW 1383->1385 1388 40a731 1385->1388 1389 40a6f3-40a701 GetFileSize 1385->1389 1390 40a734-40a738 1388->1390 1391 40a703 1389->1391 1392 40a728-40a72f CloseHandle 1389->1392 1390->1385 1393 40a73a-40a73d 1390->1393 1394 40a705-40a70b 1391->1394 1395 40a70d-40a714 1391->1395 1392->1390 1393->1384 1396 40a73f-40a746 1393->1396 1394->1392 1394->1395 1397 40a716-40a718 call 40b117 1395->1397 1398 40a71d-40a722 Sleep 1395->1398 1396->1384 1399 40a748-40a758 call 409097 call 40a1b4 1396->1399 1397->1398 1398->1392 1399->1384
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleSizeSleep
                                • String ID: XQG
                                • API String ID: 1958988193-3606453820
                                • Opcode ID: 28ce54e323a61a7c7e3df4bf156f69a9efcaf564c436a4257aa778de296e5956
                                • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                • Opcode Fuzzy Hash: 28ce54e323a61a7c7e3df4bf156f69a9efcaf564c436a4257aa778de296e5956
                                • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F

                                Control-flow Graph

                                APIs
                                • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                                  • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                  • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$LocalTimewsprintf
                                • String ID: Offline Keylogger Started
                                • API String ID: 465354869-4114347211
                                • Opcode ID: c7934c326ef2b1dcecdff176d04098d35d6efa8e09e0995c368ff86506386951
                                • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                • Opcode Fuzzy Hash: c7934c326ef2b1dcecdff176d04098d35d6efa8e09e0995c368ff86506386951
                                • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                APIs
                                • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.3 Pro), ref: 004137E1
                                • RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.3 Pro), ref: 004137EC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID: pth_unenc
                                • API String ID: 1818849710-4028850238
                                • Opcode ID: 04dffd27395d5cb7a301fd27aaace46d1b2beb75a59ed872a5e7c8f8e25a915c
                                • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                • Opcode Fuzzy Hash: 04dffd27395d5cb7a301fd27aaace46d1b2beb75a59ed872a5e7c8f8e25a915c
                                • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                APIs
                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                • GetLastError.KERNEL32 ref: 0040D0BE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateErrorLastMutex
                                • String ID: iphone-SP6UL4
                                • API String ID: 1925916568-3123026429
                                • Opcode ID: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                • Opcode Fuzzy Hash: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                APIs
                                • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                • RegCloseKey.KERNEL32(?), ref: 0041362D
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: e5c88bf4778b1a12960ae4c3b265923e79f6a7b3b3cce25859afcc872f091df0
                                • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                • Opcode Fuzzy Hash: e5c88bf4778b1a12960ae4c3b265923e79f6a7b3b3cce25859afcc872f091df0
                                • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                APIs
                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                • RegCloseKey.KERNEL32(?), ref: 004135CD
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                APIs
                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C1D7,00466C58), ref: 00413551
                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C1D7,00466C58), ref: 00413565
                                • RegCloseKey.KERNEL32(?,?,?,0040C1D7,00466C58), ref: 00413570
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                                • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                                APIs
                                • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                • RegCloseKey.KERNEL32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID:
                                • API String ID: 1818849710-0
                                • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _wcslen
                                • String ID: pQG
                                • API String ID: 176396367-3769108836
                                • Opcode ID: 2909f1be4624e20aefd95f70af1697863fb55ab0ff45cf84c0a49d4b96723009
                                • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                                • Opcode Fuzzy Hash: 2909f1be4624e20aefd95f70af1697863fb55ab0ff45cf84c0a49d4b96723009
                                • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                                APIs
                                • _free.LIBCMT ref: 00446227
                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                • HeapReAlloc.KERNEL32(00000000,00000000,?,?,0000000F,00000000,00432F93,00000000,0000000F,0042F99D,?,?,00431A44,?,?,00000000), ref: 00446263
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$AllocAllocate_free
                                • String ID:
                                • API String ID: 2447670028-0
                                • Opcode ID: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                                • Instruction ID: 528349031ecf72c594af6ac828cc426c74ce8c7b4bfa82022820746e0f177899
                                • Opcode Fuzzy Hash: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                                • Instruction Fuzzy Hash: 4CF0283110121176BB213B266C01B6B3759AF83B70B1700ABFC1466281CFBCCC41406F
                                APIs
                                • socket.WS2_32(?,00000001,00000006), ref: 00404852
                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                  • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateEventStartupsocket
                                • String ID:
                                • API String ID: 1953588214-0
                                • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                                • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                • Opcode Fuzzy Hash: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                APIs
                                • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,004151C3,00000000,00000001), ref: 00414F46
                                • WSASetLastError.WS2_32(00000000), ref: 00414F4B
                                  • Part of subcall function 00414DC1: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                  • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414E52
                                  • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                  • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                  • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                  • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                  • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                  • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                • String ID:
                                • API String ID: 1170566393-0
                                • Opcode ID: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                • Instruction ID: 64a5677b7ab27dcaa32d5743096e05a6e92bfc5102e3e8065abb212a99eff034
                                • Opcode Fuzzy Hash: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                • Instruction Fuzzy Hash: 23D017322005316BD320A769AC00AEBAA9EDFD6760B12003BBD08D2251DA949C8286E8
                                APIs
                                • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocateHeap
                                • String ID:
                                • API String ID: 1279760036-0
                                • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                APIs
                                • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Startup
                                • String ID:
                                • API String ID: 724789610-0
                                • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                                • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: send
                                • String ID:
                                • API String ID: 2809346765-0
                                • Opcode ID: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                • Instruction ID: 21703143275c54c82102de5c78eddca0fb0a16d203a0de67c7bd570fb3111ac2
                                • Opcode Fuzzy Hash: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                • Instruction Fuzzy Hash: 87B09B75108301FFD6150760CC0486A7D6597C8341F00491C718741170C635C8515725
                                APIs
                                • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                  • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                  • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                  • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                  • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                  • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                  • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                  • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                • DeleteFileA.KERNEL32(?), ref: 0040868D
                                  • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                  • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                  • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                  • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                • Sleep.KERNEL32(000007D0), ref: 00408733
                                • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                  • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                • String ID: (PG$(aF$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                • API String ID: 1067849700-414524693
                                • Opcode ID: fc876e41b72d509e8154fd9ee22d13ec532505f20f9aff529124cedb1fde61f5
                                • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                • Opcode Fuzzy Hash: fc876e41b72d509e8154fd9ee22d13ec532505f20f9aff529124cedb1fde61f5
                                • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 004056E6
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                • __Init_thread_footer.LIBCMT ref: 00405723
                                • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                  • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                                • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                • CloseHandle.KERNEL32 ref: 00405A23
                                • CloseHandle.KERNEL32 ref: 00405A2B
                                • CloseHandle.KERNEL32 ref: 00405A3D
                                • CloseHandle.KERNEL32 ref: 00405A45
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                • API String ID: 2994406822-18413064
                                • Opcode ID: a710c12175a51dec8729547deed0240019036514a0c002d88f574e066897a0bd
                                • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                • Opcode Fuzzy Hash: a710c12175a51dec8729547deed0240019036514a0c002d88f574e066897a0bd
                                • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                APIs
                                • GetCurrentProcessId.KERNEL32 ref: 00412141
                                  • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                  • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                  • Part of subcall function 004138B2: RegCloseKey.KERNEL32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                • CloseHandle.KERNEL32(00000000), ref: 00412190
                                • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                • API String ID: 3018269243-13974260
                                • Opcode ID: 0bc6abb93a007a62e155aad46a945be6e257eeb2644a433d62495adb5594a49a
                                • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                • Opcode Fuzzy Hash: 0bc6abb93a007a62e155aad46a945be6e257eeb2644a433d62495adb5594a49a
                                • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                • FindClose.KERNEL32(00000000), ref: 0040BC04
                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFile$FirstNext
                                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                • API String ID: 1164774033-3681987949
                                • Opcode ID: 6c639a8cbac5ca484f8773e9da93299d118512ec2cf8b834913427766c983489
                                • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                • Opcode Fuzzy Hash: 6c639a8cbac5ca484f8773e9da93299d118512ec2cf8b834913427766c983489
                                • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                APIs
                                • OpenClipboard.USER32 ref: 004168FD
                                • EmptyClipboard.USER32 ref: 0041690B
                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                • GlobalLock.KERNEL32(00000000), ref: 00416934
                                • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                • CloseClipboard.USER32 ref: 00416990
                                • OpenClipboard.USER32 ref: 00416997
                                • GetClipboardData.USER32(0000000D), ref: 004169A7
                                • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                • CloseClipboard.USER32 ref: 004169BF
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                • String ID: !D@$xdF
                                • API String ID: 3520204547-3540039394
                                • Opcode ID: 5191756a023fad829b92f3fa5878b55421fcb75fc4cc2359890982a259b57d49
                                • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                • Opcode Fuzzy Hash: 5191756a023fad829b92f3fa5878b55421fcb75fc4cc2359890982a259b57d49
                                • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                  • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                  • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$xdF$xdF
                                • API String ID: 3756808967-2341171916
                                • Opcode ID: c575ac8939463ca684cedb7c6906afd83d502d5e5bbe83c4c666d8f6a0325efa
                                • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                • Opcode Fuzzy Hash: c575ac8939463ca684cedb7c6906afd83d502d5e5bbe83c4c666d8f6a0325efa
                                • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                • FindClose.KERNEL32(00000000), ref: 0040BE04
                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$Close$File$FirstNext
                                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                • API String ID: 3527384056-432212279
                                • Opcode ID: ac2c58898ed4881048f14169fe64a4f28670cbea93e3b81032ca527b9b506f8a
                                • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                • Opcode Fuzzy Hash: ac2c58898ed4881048f14169fe64a4f28670cbea93e3b81032ca527b9b506f8a
                                • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                APIs
                                • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                • CloseHandle.KERNEL32(?), ref: 004134A0
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                • String ID:
                                • API String ID: 297527592-0
                                • Opcode ID: 33a11f1d8b65504666c7f3d6a65dc1c7f241de2952f14d7c983c905d35a598f5
                                • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                • Opcode Fuzzy Hash: 33a11f1d8b65504666c7f3d6a65dc1c7f241de2952f14d7c983c905d35a598f5
                                • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0$1$2$3$4$5$6$7$VG
                                • API String ID: 0-1861860590
                                • Opcode ID: fa5d28c5653a06ee74d606b0804547a39682ca64517b0fde9ecd30e9690a319d
                                • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                • Opcode Fuzzy Hash: fa5d28c5653a06ee74d606b0804547a39682ca64517b0fde9ecd30e9690a319d
                                • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                APIs
                                  • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                  • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                  • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                  • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                  • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                • String ID: !D@$$aF$(aF$,aF$PowrProf.dll$SetSuspendState
                                • API String ID: 1589313981-3345310279
                                • Opcode ID: 5a67a4a310bbeab77cb956b6f29dad078fe7ead2311179410cf603bdc65d0c30
                                • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                • Opcode Fuzzy Hash: 5a67a4a310bbeab77cb956b6f29dad078fe7ead2311179410cf603bdc65d0c30
                                • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                APIs
                                • _wcslen.LIBCMT ref: 0040755C
                                • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object_wcslen
                                • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                • API String ID: 240030777-3166923314
                                • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                • GetLastError.KERNEL32 ref: 0041A84C
                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                • String ID:
                                • API String ID: 3587775597-0
                                • Opcode ID: a1aa029647e6b911d73bb73d0b4c014ff2ed4e84f9fda5b1c3cafc713725b12c
                                • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                • Opcode Fuzzy Hash: a1aa029647e6b911d73bb73d0b4c014ff2ed4e84f9fda5b1c3cafc713725b12c
                                • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                  • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Find$CreateFirstNext
                                • String ID: 8SG$8eF$PXG$PXG$NG$PG
                                • API String ID: 341183262-432830541
                                • Opcode ID: 640b9650040d129e844ecc698416b76ad1790d8b5e8c2a6b143a9a7c939d55d6
                                • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                • Opcode Fuzzy Hash: 640b9650040d129e844ecc698416b76ad1790d8b5e8c2a6b143a9a7c939d55d6
                                • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                APIs
                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                • String ID: JD$JD$JD
                                • API String ID: 745075371-3517165026
                                • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$CloseFile$FirstNext
                                • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                • API String ID: 1164774033-405221262
                                • Opcode ID: 07425786a733f007aeb9a950477bd56cbd674cdc9204bf77bad9fc47ca870fce
                                • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                • Opcode Fuzzy Hash: 07425786a733f007aeb9a950477bd56cbd674cdc9204bf77bad9fc47ca870fce
                                • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C41F
                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C42C
                                  • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C44D
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C473
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                • String ID:
                                • API String ID: 2341273852-0
                                • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                APIs
                                • GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                • GetKeyState.USER32(00000010), ref: 0040A46E
                                • GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                                • ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                                • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                • String ID:
                                • API String ID: 1888522110-0
                                • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                APIs
                                • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressCloseCreateLibraryLoadProcsend
                                • String ID: SHDeleteKeyW$Shlwapi.dll
                                • API String ID: 2127411465-314212984
                                • Opcode ID: 906faeb5203d37c74ddcedaba27fd20c986479be3f450a41c0319093749beec0
                                • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                • Opcode Fuzzy Hash: 906faeb5203d37c74ddcedaba27fd20c986479be3f450a41c0319093749beec0
                                • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                APIs
                                • _free.LIBCMT ref: 00449292
                                • _free.LIBCMT ref: 004492B6
                                • _free.LIBCMT ref: 0044943D
                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                • _free.LIBCMT ref: 00449609
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                • String ID:
                                • API String ID: 314583886-0
                                • Opcode ID: 9d737620ee5c630f8ac732b373c324f56d4d8bd2db6b9a1ad30cafd364e2800f
                                • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                • Opcode Fuzzy Hash: 9d737620ee5c630f8ac732b373c324f56d4d8bd2db6b9a1ad30cafd364e2800f
                                • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                Strings
                                • 0aF, xrefs: 0040712C
                                • C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, xrefs: 00407042, 0040716A
                                • open, xrefs: 00406FF1
                                • 0aF, xrefs: 0040701B
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DownloadExecuteFileShell
                                • String ID: 0aF$0aF$C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe$open
                                • API String ID: 2825088817-807887479
                                • Opcode ID: a3d80589f937fc00409f1c87b067b324c796cd20f872ee043c00395bc31b0696
                                • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                • Opcode Fuzzy Hash: a3d80589f937fc00409f1c87b067b324c796cd20f872ee043c00395bc31b0696
                                • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                APIs
                                • __EH_prolog.LIBCMT ref: 0040884C
                                • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                • String ID: xdF
                                • API String ID: 1771804793-999140092
                                • Opcode ID: f4b51b2c778cc903a76b83995408fe472956efc0dc2707ff349452219b6188ab
                                • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                • Opcode Fuzzy Hash: f4b51b2c778cc903a76b83995408fe472956efc0dc2707ff349452219b6188ab
                                • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                APIs
                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                • GetLastError.KERNEL32 ref: 0040BA93
                                Strings
                                • UserProfile, xrefs: 0040BA59
                                • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteErrorFileLast
                                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                • API String ID: 2018770650-1062637481
                                • Opcode ID: 8d1b9c386d9f6ca777f4705084fddfe26be0f649cbc95c9792bf321ed182c299
                                • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                • Opcode Fuzzy Hash: 8d1b9c386d9f6ca777f4705084fddfe26be0f649cbc95c9792bf321ed182c299
                                • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                APIs
                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                • GetLastError.KERNEL32 ref: 004179D8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                • String ID: SeShutdownPrivilege
                                • API String ID: 3534403312-3733053543
                                • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: __floor_pentium4
                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                • API String ID: 4168288129-2761157908
                                • Opcode ID: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                                • Instruction ID: 22fd31c6184e07a9d3e8c26eafc68e38345e899adb4ac4f90a3aea4af7cb717d
                                • Opcode Fuzzy Hash: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                                • Instruction Fuzzy Hash: BBC27E71D046288FDB25CE28DD407EAB3B5EB8530AF1541EBD80DE7241E778AE898F45
                                APIs
                                • __EH_prolog.LIBCMT ref: 00409293
                                  • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                • FindClose.KERNEL32(00000000), ref: 004093FC
                                  • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                  • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                  • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                • FindClose.KERNEL32(00000000), ref: 004095F4
                                  • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                  • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                • String ID:
                                • API String ID: 1824512719-0
                                • Opcode ID: 5217273ce41631ec4f36bb50ecbc328d28b03a03593037bf82bad60bde0a87b4
                                • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                • Opcode Fuzzy Hash: 5217273ce41631ec4f36bb50ecbc328d28b03a03593037bf82bad60bde0a87b4
                                • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ManagerStart
                                • String ID:
                                • API String ID: 276877138-0
                                • Opcode ID: d2aae47141dcf0d9b89d10f0773cee60e0a3b0657566105474702d9dbd979937
                                • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                • Opcode Fuzzy Hash: d2aae47141dcf0d9b89d10f0773cee60e0a3b0657566105474702d9dbd979937
                                • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                APIs
                                • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID: ACP$OCP
                                • API String ID: 2299586839-711371036
                                • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFind$FirstNextsend
                                • String ID: 8eF$XPG$XPG
                                • API String ID: 4113138495-4157548504
                                • Opcode ID: 20c8045531a9471aa8b02c6f4ac93d25acd726a71398db01e6c16fdcd5dcb5aa
                                • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                • Opcode Fuzzy Hash: 20c8045531a9471aa8b02c6f4ac93d25acd726a71398db01e6c16fdcd5dcb5aa
                                • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                APIs
                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                  • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                  • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.3 Pro), ref: 004137E1
                                  • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.3 Pro), ref: 004137EC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateInfoParametersSystemValue
                                • String ID: ,aF$Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                • API String ID: 4127273184-3126330168
                                • Opcode ID: 1b8314d2076e9d5c703d8fca3d96c61d813be21baf7682ae790ff92cd480d8bc
                                • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                • Opcode Fuzzy Hash: 1b8314d2076e9d5c703d8fca3d96c61d813be21baf7682ae790ff92cd480d8bc
                                • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                APIs
                                • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$FindLoadLockSizeof
                                • String ID: SETTINGS
                                • API String ID: 3473537107-594951305
                                • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                APIs
                                • __EH_prolog.LIBCMT ref: 004096A5
                                • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Find$File$CloseFirstH_prologNext
                                • String ID:
                                • API String ID: 1157919129-0
                                • Opcode ID: a4f9002d73e35e52d1f42a8e8860448eabd2e2251ec59754596a7abefe28d24e
                                • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                • Opcode Fuzzy Hash: a4f9002d73e35e52d1f42a8e8860448eabd2e2251ec59754596a7abefe28d24e
                                • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                APIs
                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                • String ID:
                                • API String ID: 4212172061-0
                                • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                APIs
                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                • String ID: p'E$JD
                                • API String ID: 1084509184-908320845
                                • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                APIs
                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorInfoLastLocale$_free$_abort
                                • String ID:
                                • API String ID: 2829624132-0
                                • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                APIs
                                • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                                • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                • String ID:
                                • API String ID: 3906539128-0
                                • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                APIs
                                • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                                • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                                • ExitProcess.KERNEL32 ref: 0044338F
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CurrentExitTerminate
                                • String ID:
                                • API String ID: 1703294689-0
                                • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                APIs
                                • OpenClipboard.USER32(00000000), ref: 0040B74C
                                • GetClipboardData.USER32(0000000D), ref: 0040B758
                                • CloseClipboard.USER32 ref: 0040B760
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$CloseDataOpen
                                • String ID:
                                • API String ID: 2058664381-0
                                • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                APIs
                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                                • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                                • CloseHandle.KERNEL32(00000000,?,?,0041605F,00000000), ref: 0041BBE7
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandleOpenResume
                                • String ID:
                                • API String ID: 3614150671-0
                                • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                                • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                                APIs
                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                                • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                                • CloseHandle.KERNEL32(00000000,?,?,0041603A,00000000), ref: 0041BBBB
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandleOpenSuspend
                                • String ID:
                                • API String ID: 1999457699-0
                                • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                                • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: .
                                • API String ID: 0-248832578
                                • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                                • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                                APIs
                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                • String ID: JD
                                • API String ID: 1084509184-2669065882
                                • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                APIs
                                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID: GetLocaleInfoEx
                                • API String ID: 2299586839-2904428671
                                • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                                • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                                APIs
                                • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Heap$FreeProcess
                                • String ID:
                                • API String ID: 3859560861-0
                                • Opcode ID: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                                • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                                • Opcode Fuzzy Hash: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                                • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                                APIs
                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004533A6,?,?,00000008,?,?,0045625D,00000000), ref: 004535D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionRaise
                                • String ID:
                                • API String ID: 3997070919-0
                                • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                • Instruction ID: 7263c04077df6a1dd25da4ac29b5b982fa38ace811980f45f75c7c5cedc24273
                                • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                • Instruction Fuzzy Hash: 0FB13B315106089FD715CF28C48AB657BE0FF053A6F25865DE899CF3A2C339EA96CB44
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 0
                                • API String ID: 0-4108050209
                                • Opcode ID: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                • Instruction ID: b5ae8e6f7fa87a7dee9e60626e0a37a25df5f2dd99b83f8da903d7583ecded6c
                                • Opcode Fuzzy Hash: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                • Instruction Fuzzy Hash: 0C129E727083048BD304DF65D882A1EB7E2BFCC758F15892EF495AB381DA74E915CB86
                                APIs
                                • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FeaturePresentProcessor
                                • String ID:
                                • API String ID: 2325560087-0
                                • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                APIs
                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free$InfoLocale_abort
                                • String ID:
                                • API String ID: 1663032902-0
                                • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                APIs
                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$InfoLocale_abort_free
                                • String ID:
                                • API String ID: 2692324296-0
                                • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                APIs
                                  • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                • String ID:
                                • API String ID: 1272433827-0
                                • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                APIs
                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                • String ID:
                                • API String ID: 1084509184-0
                                • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                APIs
                                • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.3 Pro), ref: 0040F920
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID:
                                • API String ID: 2299586839-0
                                • Opcode ID: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                • Opcode Fuzzy Hash: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                • Instruction Fuzzy Hash:
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: @
                                • API String ID: 0-2766056989
                                • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                • Instruction ID: bbd91956ea41f9089fdf4ea26de33e0e8d132f349ea16d9e77f48d305cf446da
                                • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                • Instruction Fuzzy Hash: F1412975A183558FC340CF29D58020AFBE1FFC8318F645A1EF889A3350D379E9428B86
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                • Instruction ID: 4200599dcb49c21c1ca78238ad82984ca11e49a574bdd01b256a4bdf4e559873
                                • Opcode Fuzzy Hash: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                • Instruction Fuzzy Hash: D2322521D69F414DE7239A35CC22336A24CBFB73C5F15D737E81AB5AAAEB29C4834105
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                                • Instruction ID: 06c66d0f35fb266b7f69fbfce4f1f639eb17408d85dd7e5468211ecdc8378744
                                • Opcode Fuzzy Hash: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                                • Instruction Fuzzy Hash: 7932C2716087459BC715DF28C4807ABB7E5BF84318F040A3EF89587392D779D98ACB8A
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                                • Instruction ID: b033fe34555866f616fd3cc64b543b740d9cc82fbf2d17309ab2a27531c6336b
                                • Opcode Fuzzy Hash: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                                • Instruction Fuzzy Hash: 6C02CEB17046528BC358CF2EEC5053AB7E1AB8D311744863EE495C7781EB35FA22CB94
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                                • Instruction ID: 06b531cc06dcd57701b547059d2c567c45bbe225ee7d26ac7aed84b394be02a5
                                • Opcode Fuzzy Hash: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                                • Instruction Fuzzy Hash: 2DF19D716142558FC348CF1DE8A187BB3E1FB89311B450A2EF582C3391DB79EA16CB56
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                • Instruction ID: 2ce137016e68017aebaac4bbf916a57dff7c64f07ba89619fc9d118b501662d8
                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                • Instruction Fuzzy Hash: F9C1D5B22091930AEF3D4639853063FFAA05E957B171A635FE4F2CB2D4FE18C924D514
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                • Instruction ID: bc2d6065b6eca92eb436045fb502f22698d18e4b36ed1375ff5d5b4a3f5914d0
                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                • Instruction Fuzzy Hash: 75C1D7722091930AEF2D4739853463FFAA15EA57B171A236FE4F2CB2D4FE28C924D514
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                • Instruction ID: 708e8454946620f186a1700387687a053fc407bd339bf74556c1f47a113f5a1a
                                • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                • Instruction Fuzzy Hash: 95C1C3B220D0930AEF3D4639853063FFAA15EA67B171A675ED4F2CB2D4FE18C924D614
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction ID: 79ee4f31eba35b7567f7a499d226924a3a6c1d38d98321864059dc3c63d33f3d
                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction Fuzzy Hash: 76C1E6B220D0930AEF3D4639853463FBAA15EA57B171A236FD4F2CB2D4FE18C924C614
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                                • Instruction ID: 096ff1c695f9ab27d4b2dbab46670c8098de74970727e2ec16deab2a6828ec1d
                                • Opcode Fuzzy Hash: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                                • Instruction Fuzzy Hash: EAB1A37951429A8ACB05EF68C4913F63BA1EF6A301F0850B9EC9CCF757D2398506EB24
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                • Instruction ID: 32d6082e35155a0a096806a6943d6f48c3d67459c64856e3d931f7c23e0710f9
                                • Opcode Fuzzy Hash: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                • Instruction Fuzzy Hash: 59618971202709A6EE34892B88967BF63949F6D314F10342FE983DB3C1D65DDD82931E
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                • Instruction ID: 5d22fc1bcc5d638cf6a4a0606be4d5c4d5bba199c703cf788a7f99cafe8d65e8
                                • Opcode Fuzzy Hash: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                • Instruction Fuzzy Hash: 12615871602718A6DA38592B88977BF2384EB2D344F94351BE483DB3C1D75EAD43871E
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                • Instruction ID: 6c705508b021f12d90b9f9697341ee8142861c1d23b7247138392dbd6e0aa073
                                • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                • Instruction Fuzzy Hash: 59517671603604A7EF3445AB85567BF63899B0E304F18395FE882C73C2C52DDE02875E
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                • Instruction ID: 84bf5d8b6cf777f915eff3509e2c27b9c7ae744ab127a35c194aadb47efed811
                                • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                • Instruction Fuzzy Hash: E1517761E0660557DF38892A94D67BF23A59B4E308F18351FE483CB3C2C65EEE06835E
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                                • Instruction ID: d4d389248adab082d17fbdeb677dfbf93ddf16fcbb8c162b69e64d6cf0e33668
                                • Opcode Fuzzy Hash: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                                • Instruction Fuzzy Hash: 61615B72A083059BC308DF35E481A5FB7E4AFCC718F814E2EF595D6151EA74EA08CB86
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                • Instruction ID: 582e3a7babb983407823034c482dc4f24404013c153b7f4d28c3fef3b0c68a44
                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                • Instruction Fuzzy Hash: 43113B7720034183D60CAA6DC4B45BBD795EADE320FBD627FF0414B744CA2AD4459508
                                APIs
                                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                  • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                • DeleteDC.GDI32(00000000), ref: 00418F65
                                • DeleteDC.GDI32(00000000), ref: 00418F68
                                • DeleteObject.GDI32(00000000), ref: 00418F6B
                                • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                • DeleteDC.GDI32(00000000), ref: 00418F9D
                                • DeleteDC.GDI32(00000000), ref: 00418FA0
                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                • GetCursorInfo.USER32(?), ref: 00418FE2
                                • GetIconInfo.USER32(?,?), ref: 00418FF8
                                • DeleteObject.GDI32(?), ref: 00419027
                                • DeleteObject.GDI32(?), ref: 00419034
                                • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                • DeleteDC.GDI32(?), ref: 004191B7
                                • DeleteDC.GDI32(00000000), ref: 004191BA
                                • DeleteObject.GDI32(00000000), ref: 004191BD
                                • GlobalFree.KERNEL32(?), ref: 004191C8
                                • DeleteObject.GDI32(00000000), ref: 0041927C
                                • GlobalFree.KERNEL32(?), ref: 00419283
                                • DeleteDC.GDI32(?), ref: 00419293
                                • DeleteDC.GDI32(00000000), ref: 0041929E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                • String ID: DISPLAY
                                • API String ID: 4256916514-865373369
                                • Opcode ID: 799be7aff8297cad8d269890d6ff6f22cd9dbeba37925029a959e739b05e8254
                                • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                • Opcode Fuzzy Hash: 799be7aff8297cad8d269890d6ff6f22cd9dbeba37925029a959e739b05e8254
                                • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                APIs
                                  • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                  • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                  • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                  • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                  • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                  • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                • ExitProcess.KERNEL32 ref: 0040D80B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("$xdF$xpF
                                • API String ID: 1861856835-1269936466
                                • Opcode ID: 3831aceb1d22e6e7d0b93e81b17b4507cce6e75ae5e0c8aaec154484add800c1
                                • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                • Opcode Fuzzy Hash: 3831aceb1d22e6e7d0b93e81b17b4507cce6e75ae5e0c8aaec154484add800c1
                                • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                APIs
                                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                • ResumeThread.KERNEL32(?), ref: 00418470
                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                • GetLastError.KERNEL32 ref: 004184B5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                • API String ID: 4188446516-3035715614
                                • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59
                                APIs
                                  • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                  • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                  • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                  • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                  • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                  • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                • ExitProcess.KERNEL32 ref: 0040D454
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xdF$xpF
                                • API String ID: 3797177996-2858374497
                                • Opcode ID: 5ea89510e99e255cff43ffc81d3dc9d7b560b2414651548bcd7dcad2d5155117
                                • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                • Opcode Fuzzy Hash: 5ea89510e99e255cff43ffc81d3dc9d7b560b2414651548bcd7dcad2d5155117
                                • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                APIs
                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                • CloseHandle.KERNEL32(00000000), ref: 00412576
                                • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                  • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                • Sleep.KERNEL32(000001F4), ref: 004126BD
                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                • String ID: .exe$8SG$WDH$exepath$open$temp_
                                • API String ID: 2649220323-436679193
                                • Opcode ID: e4498816270222a488e6bf5402939aedbcf49cf9c73125b441753154fee32edb
                                • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                • Opcode Fuzzy Hash: e4498816270222a488e6bf5402939aedbcf49cf9c73125b441753154fee32edb
                                • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                APIs
                                • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                                • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                • SetEvent.KERNEL32 ref: 0041B2AA
                                • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                • CloseHandle.KERNEL32 ref: 0041B2CB
                                • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                • API String ID: 738084811-2094122233
                                • Opcode ID: 1d877dcbc1b23002afbada965c9bddf541debd2a79e700171488071fa355c7d2
                                • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                • Opcode Fuzzy Hash: 1d877dcbc1b23002afbada965c9bddf541debd2a79e700171488071fa355c7d2
                                • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                APIs
                                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Write$Create
                                • String ID: RIFF$WAVE$data$fmt
                                • API String ID: 1602526932-4212202414
                                • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                APIs
                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe,00000001,00407688,C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                • API String ID: 1646373207-3162464150
                                • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                APIs
                                • _wcslen.LIBCMT ref: 0040CE42
                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                • _wcslen.LIBCMT ref: 0040CF21
                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe,00000000,00000000), ref: 0040CFBF
                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                • _wcslen.LIBCMT ref: 0040D001
                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                • ExitProcess.KERNEL32 ref: 0040D09D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                • String ID: 6$C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe$del$open$xdF
                                • API String ID: 1579085052-2984345251
                                • Opcode ID: 1f26a9a137c80f5632c92eb2222ab7f2ba6ebdcc1e6d02a5e4a10b2a6e82a7e9
                                • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                • Opcode Fuzzy Hash: 1f26a9a137c80f5632c92eb2222ab7f2ba6ebdcc1e6d02a5e4a10b2a6e82a7e9
                                • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                APIs
                                • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                • _wcslen.LIBCMT ref: 0041C1CC
                                • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                • GetLastError.KERNEL32 ref: 0041C204
                                • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                • GetLastError.KERNEL32 ref: 0041C261
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                • String ID: ?
                                • API String ID: 3941738427-1684325040
                                • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                  • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                  • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                  • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                • Sleep.KERNEL32(00000064), ref: 00412ECF
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                • String ID: /stext "$,aF$0TG$0TG$NG$NG
                                • API String ID: 1223786279-4119708859
                                • Opcode ID: cb9c8e514a03fffe39a67888c38defc63896ca07a3b47e43f0cc2a8d1a09612f
                                • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                • Opcode Fuzzy Hash: cb9c8e514a03fffe39a67888c38defc63896ca07a3b47e43f0cc2a8d1a09612f
                                • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$EnvironmentVariable$_wcschr
                                • String ID:
                                • API String ID: 3899193279-0
                                • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                • __aulldiv.LIBCMT ref: 00408D88
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                • CloseHandle.KERNEL32(00000000), ref: 00409037
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $xdF$NG
                                • API String ID: 3086580692-3944908133
                                • Opcode ID: 375fd4d1ba84a221b6b379f1ba586c6507ce90ea72b898bc605ef2d0a248505e
                                • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                • Opcode Fuzzy Hash: 375fd4d1ba84a221b6b379f1ba586c6507ce90ea72b898bc605ef2d0a248505e
                                • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                APIs
                                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                • GetCursorPos.USER32(?), ref: 0041D67A
                                • SetForegroundWindow.USER32(?), ref: 0041D683
                                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                • ExitProcess.KERNEL32 ref: 0041D6F6
                                • CreatePopupMenu.USER32 ref: 0041D6FC
                                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                • String ID: Close
                                • API String ID: 1657328048-3535843008
                                • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$Info
                                • String ID:
                                • API String ID: 2509303402-0
                                • Opcode ID: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                                • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                • Opcode Fuzzy Hash: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                                • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                APIs
                                  • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                  • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                  • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                  • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                  • Part of subcall function 00413733: RegCloseKey.ADVAPI32(00000000), ref: 00413773
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                • ExitProcess.KERNEL32 ref: 0040D9FF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open$xdF
                                • API String ID: 1913171305-1736969612
                                • Opcode ID: b69e3863cd24d91f8d09930e85150bb1700edda50eabfefcd59ed8dd1b1ec919
                                • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                • Opcode Fuzzy Hash: b69e3863cd24d91f8d09930e85150bb1700edda50eabfefcd59ed8dd1b1ec919
                                • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                APIs
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                • String ID: \ws2_32$\wship6$getaddrinfo
                                • API String ID: 2490988753-3078833738
                                • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                                APIs
                                • ___free_lconv_mon.LIBCMT ref: 0045138A
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                  • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                • _free.LIBCMT ref: 0045137F
                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                • _free.LIBCMT ref: 004513A1
                                • _free.LIBCMT ref: 004513B6
                                • _free.LIBCMT ref: 004513C1
                                • _free.LIBCMT ref: 004513E3
                                • _free.LIBCMT ref: 004513F6
                                • _free.LIBCMT ref: 00451404
                                • _free.LIBCMT ref: 0045140F
                                • _free.LIBCMT ref: 00451447
                                • _free.LIBCMT ref: 0045144E
                                • _free.LIBCMT ref: 0045146B
                                • _free.LIBCMT ref: 00451483
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                • String ID:
                                • API String ID: 161543041-0
                                • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                APIs
                                • __EH_prolog.LIBCMT ref: 0041A04A
                                • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                • GetLocalTime.KERNEL32(?), ref: 0041A196
                                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                • API String ID: 489098229-1431523004
                                • Opcode ID: ef3a2b2680ef5ec4cf1756d8d4e3928048fec3981f722f661be4b2a60a96407b
                                • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                • Opcode Fuzzy Hash: ef3a2b2680ef5ec4cf1756d8d4e3928048fec3981f722f661be4b2a60a96407b
                                • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                APIs
                                  • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                • GetLastError.KERNEL32 ref: 00455D6F
                                • __dosmaperr.LIBCMT ref: 00455D76
                                • GetFileType.KERNEL32(00000000), ref: 00455D82
                                • GetLastError.KERNEL32 ref: 00455D8C
                                • __dosmaperr.LIBCMT ref: 00455D95
                                • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                • CloseHandle.KERNEL32(?), ref: 00455EFF
                                • GetLastError.KERNEL32 ref: 00455F31
                                • __dosmaperr.LIBCMT ref: 00455F38
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                • String ID: H
                                • API String ID: 4237864984-2852464175
                                • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: \&G$\&G$`&G
                                • API String ID: 269201875-253610517
                                • Opcode ID: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                                • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                • Opcode Fuzzy Hash: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                                • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: 65535$udp
                                • API String ID: 0-1267037602
                                • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                APIs
                                • OpenClipboard.USER32 ref: 0041697C
                                • EmptyClipboard.USER32 ref: 0041698A
                                • CloseClipboard.USER32 ref: 00416990
                                • OpenClipboard.USER32 ref: 00416997
                                • GetClipboardData.USER32(0000000D), ref: 004169A7
                                • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                • CloseClipboard.USER32 ref: 004169BF
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                • String ID: !D@$xdF
                                • API String ID: 2172192267-3540039394
                                • Opcode ID: 0916ac08766f268bc748aa182f3e4d0b5c60d1c6def3acf1de95a0795d360f37
                                • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                • Opcode Fuzzy Hash: 0916ac08766f268bc748aa182f3e4d0b5c60d1c6def3acf1de95a0795d360f37
                                • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                • __dosmaperr.LIBCMT ref: 0043A926
                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                • __dosmaperr.LIBCMT ref: 0043A963
                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                • __dosmaperr.LIBCMT ref: 0043A9B7
                                • _free.LIBCMT ref: 0043A9C3
                                • _free.LIBCMT ref: 0043A9CA
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                • String ID:
                                • API String ID: 2441525078-0
                                • Opcode ID: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                                • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                • Opcode Fuzzy Hash: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                                • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                APIs
                                • SetEvent.KERNEL32(?,?), ref: 004054BF
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                • TranslateMessage.USER32(?), ref: 0040557E
                                • DispatchMessageA.USER32(?), ref: 00405589
                                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                • String ID: CloseChat$DisplayMessage$GetMessage
                                • API String ID: 2956720200-749203953
                                • Opcode ID: c169fda0156d4d4cd66ad22aedc816e36154925b5c0f60d04c95d765b92539fd
                                • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                • Opcode Fuzzy Hash: c169fda0156d4d4cd66ad22aedc816e36154925b5c0f60d04c95d765b92539fd
                                • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                APIs
                                • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                  • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                  • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnumInfoOpenQuerysend
                                • String ID: (aF$,aF$xUG$xdF$NG$NG$TG
                                • API String ID: 3114080316-4028018678
                                • Opcode ID: 0cf4120cb72ce5ad768c2cdf519f821beb26049f542a20a1734b386146b4ead6
                                • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                • Opcode Fuzzy Hash: 0cf4120cb72ce5ad768c2cdf519f821beb26049f542a20a1734b386146b4ead6
                                • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                APIs
                                  • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                • String ID: 0VG$0VG$<$@$Temp
                                • API String ID: 1704390241-2575729100
                                • Opcode ID: 80ffa916d59d600171d9ca3e34e0670cc9ac865161bbbc65e8436c0bee0f72cd
                                • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                • Opcode Fuzzy Hash: 80ffa916d59d600171d9ca3e34e0670cc9ac865161bbbc65e8436c0bee0f72cd
                                • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                • int.LIBCPMT ref: 00410EBC
                                  • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                  • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                • __Init_thread_footer.LIBCMT ref: 00410F64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                • String ID: ,kG$0kG$@!G
                                • API String ID: 3815856325-312998898
                                • Opcode ID: 234cc645e6f2b623d94fc8cb2d29f52bc734eee13d30ec18b0bfe81019bed365
                                • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                • Opcode Fuzzy Hash: 234cc645e6f2b623d94fc8cb2d29f52bc734eee13d30ec18b0bfe81019bed365
                                • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: 096e2c87fc6c65f47e4c6c752a7259066b900e282f660f6c8049b8ab8b72f741
                                • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                • Opcode Fuzzy Hash: 096e2c87fc6c65f47e4c6c752a7259066b900e282f660f6c8049b8ab8b72f741
                                • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                APIs
                                • _free.LIBCMT ref: 004481B5
                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                • _free.LIBCMT ref: 004481C1
                                • _free.LIBCMT ref: 004481CC
                                • _free.LIBCMT ref: 004481D7
                                • _free.LIBCMT ref: 004481E2
                                • _free.LIBCMT ref: 004481ED
                                • _free.LIBCMT ref: 004481F8
                                • _free.LIBCMT ref: 00448203
                                • _free.LIBCMT ref: 0044820E
                                • _free.LIBCMT ref: 0044821C
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                APIs
                                • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                                • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                Strings
                                • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041C738
                                • DisplayName, xrefs: 0041C7CD
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnumOpen
                                • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                • API String ID: 1332880857-3614651759
                                • Opcode ID: 0758d2217d4cdf4be18b27332201ce298183b926a753a4e26667fde6bb3e7a3c
                                • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                • Opcode Fuzzy Hash: 0758d2217d4cdf4be18b27332201ce298183b926a753a4e26667fde6bb3e7a3c
                                • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Eventinet_ntoa
                                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                • API String ID: 3578746661-3604713145
                                • Opcode ID: a77d47271dc343d34bbee68d757bbcc928c929ff734791c6900b147cae5cbd3f
                                • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                • Opcode Fuzzy Hash: a77d47271dc343d34bbee68d757bbcc928c929ff734791c6900b147cae5cbd3f
                                • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                  • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                • Sleep.KERNEL32(00000064), ref: 0041755C
                                • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CreateDeleteExecuteShellSleep
                                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                • API String ID: 1462127192-2001430897
                                • Opcode ID: 74e705e902443d92e757842fd98a6aa38e7ce8337cfacc1c2ca4f7e1e99f0fa5
                                • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                • Opcode Fuzzy Hash: 74e705e902443d92e757842fd98a6aa38e7ce8337cfacc1c2ca4f7e1e99f0fa5
                                • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                APIs
                                • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe), ref: 004074D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentProcess
                                • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                • API String ID: 2050909247-4242073005
                                • Opcode ID: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                • Opcode Fuzzy Hash: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                APIs
                                • _strftime.LIBCMT ref: 00401D50
                                  • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                • API String ID: 3809562944-243156785
                                • Opcode ID: 272d9e95f202b5b87e8d6f02197a65f7d4795c5aee8df22827821352ca84ba3d
                                • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                • Opcode Fuzzy Hash: 272d9e95f202b5b87e8d6f02197a65f7d4795c5aee8df22827821352ca84ba3d
                                • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                APIs
                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                • waveInStart.WINMM ref: 00401CFE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                • String ID: dMG$|MG$PG
                                • API String ID: 1356121797-532278878
                                • Opcode ID: 6aa69cd6a01d0fe2356010249b9bd36d42245e4d7c734ee1dd99acc2b44a8f66
                                • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                • Opcode Fuzzy Hash: 6aa69cd6a01d0fe2356010249b9bd36d42245e4d7c734ee1dd99acc2b44a8f66
                                • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                  • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                  • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                  • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                • TranslateMessage.USER32(?), ref: 0041D57A
                                • DispatchMessageA.USER32(?), ref: 0041D584
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                • String ID: Remcos
                                • API String ID: 1970332568-165870891
                                • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                                • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                • Opcode Fuzzy Hash: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                                • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                APIs
                                • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                • __alloca_probe_16.LIBCMT ref: 00453F6A
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                • __alloca_probe_16.LIBCMT ref: 00454014
                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                • __freea.LIBCMT ref: 00454083
                                • __freea.LIBCMT ref: 0045408F
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                • String ID:
                                • API String ID: 201697637-0
                                • Opcode ID: d666079201eac34123aff993431e960db56ae36dfd708acf9a18ada5241d4519
                                • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                • Opcode Fuzzy Hash: d666079201eac34123aff993431e960db56ae36dfd708acf9a18ada5241d4519
                                • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                APIs
                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • _memcmp.LIBVCRUNTIME ref: 004454A4
                                • _free.LIBCMT ref: 00445515
                                • _free.LIBCMT ref: 0044552E
                                • _free.LIBCMT ref: 00445560
                                • _free.LIBCMT ref: 00445569
                                • _free.LIBCMT ref: 00445575
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorLast$_abort_memcmp
                                • String ID: C
                                • API String ID: 1679612858-1037565863
                                • Opcode ID: 270cf3bb6288f401d2b81aec4bec5e705b2579f2f1b63f3c4bd6d63e951100ee
                                • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                • Opcode Fuzzy Hash: 270cf3bb6288f401d2b81aec4bec5e705b2579f2f1b63f3c4bd6d63e951100ee
                                • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: tcp$udp
                                • API String ID: 0-3725065008
                                • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                APIs
                                • __Init_thread_footer.LIBCMT ref: 004018BE
                                • ExitThread.KERNEL32 ref: 004018F6
                                • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                  • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                • String ID: PkG$XMG$NG$NG
                                • API String ID: 1649129571-3151166067
                                • Opcode ID: 04c6230229ba03dc03dd42187752d24fce62bcfb967b9c5647b680e770e32543
                                • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                • Opcode Fuzzy Hash: 04c6230229ba03dc03dd42187752d24fce62bcfb967b9c5647b680e770e32543
                                • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                APIs
                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                  • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                  • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                • String ID: .part
                                • API String ID: 1303771098-3499674018
                                • Opcode ID: 3afc2f85f810e2c46033f561f8352aaa8f531af2af3959b11cfb50950e871b37
                                • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                • Opcode Fuzzy Hash: 3afc2f85f810e2c46033f561f8352aaa8f531af2af3959b11cfb50950e871b37
                                • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                APIs
                                • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Console$Window$AllocOutputShow
                                • String ID: Remcos v$5.1.3 Pro$CONOUT$
                                • API String ID: 4067487056-2212855755
                                • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                                • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                                • __alloca_probe_16.LIBCMT ref: 0044AE40
                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                • __freea.LIBCMT ref: 0044AEB0
                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                • __freea.LIBCMT ref: 0044AEB9
                                • __freea.LIBCMT ref: 0044AEDE
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                • String ID:
                                • API String ID: 3864826663-0
                                • Opcode ID: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                                • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                • Opcode Fuzzy Hash: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                                • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                APIs
                                • SendInput.USER32 ref: 00419A25
                                • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                  • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InputSend$Virtual
                                • String ID:
                                • API String ID: 1167301434-0
                                • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: __freea$__alloca_probe_16_free
                                • String ID: a/p$am/pm$h{D
                                • API String ID: 2936374016-2303565833
                                • Opcode ID: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                                • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                • Opcode Fuzzy Hash: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                                • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                APIs
                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                • _free.LIBCMT ref: 00444E87
                                • _free.LIBCMT ref: 00444E9E
                                • _free.LIBCMT ref: 00444EBD
                                • _free.LIBCMT ref: 00444ED8
                                • _free.LIBCMT ref: 00444EEF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$AllocateHeap
                                • String ID: KED
                                • API String ID: 3033488037-2133951994
                                • Opcode ID: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                                • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                • Opcode Fuzzy Hash: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                                • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                APIs
                                • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Enum$InfoQueryValue
                                • String ID: [regsplt]$xUG$TG
                                • API String ID: 3554306468-1165877943
                                • Opcode ID: 6129f07ca8e649aa684d27b9dba7dc75c53e511e8a381502f1a2dc1ed25c8145
                                • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                • Opcode Fuzzy Hash: 6129f07ca8e649aa684d27b9dba7dc75c53e511e8a381502f1a2dc1ed25c8145
                                • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                APIs
                                • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                • __fassign.LIBCMT ref: 0044B4F9
                                • __fassign.LIBCMT ref: 0044B514
                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B559
                                • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B592
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                • String ID:
                                • API String ID: 1324828854-0
                                • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                APIs
                                  • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                  • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                  • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                  • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                  • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                • _wcslen.LIBCMT ref: 0041B7F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                • API String ID: 3286818993-122982132
                                • Opcode ID: 21ce8c3951ea68e9f4768855c246d238a69c4de2a44f28aaa4944944c55ea733
                                • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                • Opcode Fuzzy Hash: 21ce8c3951ea68e9f4768855c246d238a69c4de2a44f28aaa4944944c55ea733
                                • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                APIs
                                  • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                  • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                  • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                • API String ID: 1133728706-4073444585
                                • Opcode ID: e02571ccf1d8d7642eb7522d4ecac0f64e4039cdab1393baceb5a006cb27889d
                                • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                • Opcode Fuzzy Hash: e02571ccf1d8d7642eb7522d4ecac0f64e4039cdab1393baceb5a006cb27889d
                                • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                                • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                • Opcode Fuzzy Hash: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                                • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                APIs
                                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                Strings
                                • http://geoplugin.net/json.gp, xrefs: 0041B448
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$FileRead
                                • String ID: http://geoplugin.net/json.gp
                                • API String ID: 3121278467-91888290
                                • Opcode ID: ab2cbc20b1a026a18eeb93cbadf4ab6921f31ebf631c8869f851e8b96143ecd1
                                • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                • Opcode Fuzzy Hash: ab2cbc20b1a026a18eeb93cbadf4ab6921f31ebf631c8869f851e8b96143ecd1
                                • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                APIs
                                  • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                • _free.LIBCMT ref: 00450FC8
                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                • _free.LIBCMT ref: 00450FD3
                                • _free.LIBCMT ref: 00450FDE
                                • _free.LIBCMT ref: 00451032
                                • _free.LIBCMT ref: 0045103D
                                • _free.LIBCMT ref: 00451048
                                • _free.LIBCMT ref: 00451053
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                • int.LIBCPMT ref: 004111BE
                                  • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                  • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                • std::_Facet_Register.LIBCPMT ref: 004111FE
                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                • String ID: (mG
                                • API String ID: 2536120697-4059303827
                                • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                APIs
                                • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastValue___vcrt_
                                • String ID:
                                • API String ID: 3852720340-0
                                • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                APIs
                                • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe), ref: 0040760B
                                  • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                  • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                • CoUninitialize.OLE32 ref: 00407664
                                Strings
                                • [+] ShellExec success, xrefs: 00407649
                                • [+] ucmCMLuaUtilShellExecMethod, xrefs: 004075F0
                                • C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, xrefs: 004075EB, 004075EE, 00407640
                                • [+] before ShellExec, xrefs: 0040762C
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: InitializeObjectUninitialize_wcslen
                                • String ID: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                • API String ID: 3851391207-3027043547
                                • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                APIs
                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                • GetLastError.KERNEL32 ref: 0040BB22
                                Strings
                                • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                • UserProfile, xrefs: 0040BAE8
                                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                • [Chrome Cookies not found], xrefs: 0040BB3C
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteErrorFileLast
                                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                • API String ID: 2018770650-304995407
                                • Opcode ID: 40cbd1d017226246a01c6e55be9682f761922b1e96e2188b9bd7b4daff8d9f2f
                                • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                • Opcode Fuzzy Hash: 40cbd1d017226246a01c6e55be9682f761922b1e96e2188b9bd7b4daff8d9f2f
                                • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                Strings
                                • C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe, xrefs: 004076FF
                                • xdF, xrefs: 004076E4
                                • iphone-SP6UL4, xrefs: 00407715
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe$iphone-SP6UL4$xdF
                                • API String ID: 0-1958937157
                                • Opcode ID: 76fb36a6468107bc6bcf7edae7d85ad02bbabba37b75d9201cd6870646e6a122
                                • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                • Opcode Fuzzy Hash: 76fb36a6468107bc6bcf7edae7d85ad02bbabba37b75d9201cd6870646e6a122
                                • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                APIs
                                • __allrem.LIBCMT ref: 0043ACE9
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                • __allrem.LIBCMT ref: 0043AD1C
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                • __allrem.LIBCMT ref: 0043AD51
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                • String ID:
                                • API String ID: 1992179935-0
                                • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                APIs
                                • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                  • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: H_prologSleep
                                • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                • API String ID: 3469354165-3054508432
                                • Opcode ID: fef66e343663587799a4fb7e411b7be832f70b8e55665d4bb62892141d3c40a9
                                • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                • Opcode Fuzzy Hash: fef66e343663587799a4fb7e411b7be832f70b8e55665d4bb62892141d3c40a9
                                • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                APIs
                                  • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                • GetNativeSystemInfo.KERNEL32(?,0040D2DD,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                  • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                                • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                  • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                  • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                • String ID:
                                • API String ID: 3950776272-0
                                • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: __cftoe
                                • String ID:
                                • API String ID: 4189289331-0
                                • Opcode ID: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                                • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                • Opcode Fuzzy Hash: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                                • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                • String ID:
                                • API String ID: 493672254-0
                                • Opcode ID: 465ab7c2e076ec59a8d270df8ce72ad0174e5281a4bfe7e39c5caa5367581a5e
                                • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                • Opcode Fuzzy Hash: 465ab7c2e076ec59a8d270df8ce72ad0174e5281a4bfe7e39c5caa5367581a5e
                                • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                APIs
                                • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • _free.LIBCMT ref: 004482CC
                                • _free.LIBCMT ref: 004482F4
                                • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • _abort.LIBCMT ref: 00448313
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free$_abort
                                • String ID:
                                • API String ID: 3160817290-0
                                • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: f94ae9c5674c9adfc346e263051d54d626d5e40d867c234dda8e9c50f9d09011
                                • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                • Opcode Fuzzy Hash: f94ae9c5674c9adfc346e263051d54d626d5e40d867c234dda8e9c50f9d09011
                                • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: 497ef82d1474d54709910eeaca97da118b40a23fe9dfeecc14ddd5be20b51566
                                • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                • Opcode Fuzzy Hash: 497ef82d1474d54709910eeaca97da118b40a23fe9dfeecc14ddd5be20b51566
                                • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                APIs
                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandle$Open$ControlManager
                                • String ID:
                                • API String ID: 221034970-0
                                • Opcode ID: cf41fc214d4f8651c842d323f4a9434d7ee1c2a315675ff23975f89e6a089888
                                • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                • Opcode Fuzzy Hash: cf41fc214d4f8651c842d323f4a9434d7ee1c2a315675ff23975f89e6a089888
                                • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CountEventTick
                                • String ID: !D@$,aF$NG
                                • API String ID: 180926312-2771706352
                                • Opcode ID: 8d1923479cacbc34f83a544ec5835a1411f1c8a0dee8a7d2746b66dcfc5bfbac
                                • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                • Opcode Fuzzy Hash: 8d1923479cacbc34f83a544ec5835a1411f1c8a0dee8a7d2746b66dcfc5bfbac
                                • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe,00000104), ref: 00443515
                                • _free.LIBCMT ref: 004435E0
                                • _free.LIBCMT ref: 004435EA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$FileModuleName
                                • String ID: 8([$C:\Users\user\Desktop\17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615ccc44621.dat-decoded.exe
                                • API String ID: 2506810119-3171770327
                                • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                APIs
                                • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                • GetLastError.KERNEL32 ref: 0041D611
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClassCreateErrorLastRegisterWindow
                                • String ID: 0$MsgWindowClass
                                • API String ID: 2877667751-2410386613
                                • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                APIs
                                • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                • CloseHandle.KERNEL32(?), ref: 004077E5
                                • CloseHandle.KERNEL32(?), ref: 004077EA
                                Strings
                                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle$CreateProcess
                                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                • API String ID: 2922976086-4183131282
                                • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                APIs
                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressFreeHandleLibraryModuleProc
                                • String ID: CorExitProcess$mscoree.dll
                                • API String ID: 4061214504-1276376045
                                • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                APIs
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                • String ID: KeepAlive | Disabled
                                • API String ID: 2993684571-305739064
                                • Opcode ID: 79b17cb61ca097f2dd87540d91e49b40a86234966918d688794a6c742f2a43ed
                                • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                • Opcode Fuzzy Hash: 79b17cb61ca097f2dd87540d91e49b40a86234966918d688794a6c742f2a43ed
                                • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                APIs
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                • Sleep.KERNEL32(00002710), ref: 0041AE98
                                • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: PlaySound$HandleLocalModuleSleepTime
                                • String ID: Alarm triggered
                                • API String ID: 614609389-2816303416
                                • Opcode ID: 7392df8db2022c5dabbdd0a7ddbeb5ff2cdfd3fc416767bfd221d1b9e2b6ff7c
                                • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                • Opcode Fuzzy Hash: 7392df8db2022c5dabbdd0a7ddbeb5ff2cdfd3fc416767bfd221d1b9e2b6ff7c
                                • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                APIs
                                • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                Strings
                                • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Console$AttributeText$BufferHandleInfoScreen
                                • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                • API String ID: 3024135584-2418719853
                                • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                APIs
                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                • _free.LIBCMT ref: 0044943D
                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                • _free.LIBCMT ref: 00449609
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                • String ID:
                                • API String ID: 1286116820-0
                                • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                APIs
                                  • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                  • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                  • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                  • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                                  • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                  • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                • String ID:
                                • API String ID: 2180151492-0
                                • Opcode ID: b612a60f51ba30386d7e6c27c988ec9eea2298f46b4f956bf04d12ed4463d939
                                • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                • Opcode Fuzzy Hash: b612a60f51ba30386d7e6c27c988ec9eea2298f46b4f956bf04d12ed4463d939
                                • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                                • __alloca_probe_16.LIBCMT ref: 00451231
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                                • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                                • __freea.LIBCMT ref: 0045129D
                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                • String ID:
                                • API String ID: 313313983-0
                                • Opcode ID: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                                • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                • Opcode Fuzzy Hash: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                                • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                APIs
                                • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                • _free.LIBCMT ref: 0044F43F
                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                • String ID:
                                • API String ID: 336800556-0
                                • Opcode ID: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                • Opcode Fuzzy Hash: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                APIs
                                • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                                • _free.LIBCMT ref: 00448353
                                • _free.LIBCMT ref: 0044837A
                                • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                                • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$_free
                                • String ID:
                                • API String ID: 3170660625-0
                                • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                APIs
                                • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseHandleOpen$FileImageName
                                • String ID:
                                • API String ID: 2951400881-0
                                • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                APIs
                                • _free.LIBCMT ref: 00450A54
                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                • _free.LIBCMT ref: 00450A66
                                • _free.LIBCMT ref: 00450A78
                                • _free.LIBCMT ref: 00450A8A
                                • _free.LIBCMT ref: 00450A9C
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                APIs
                                • _free.LIBCMT ref: 00444106
                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                • _free.LIBCMT ref: 00444118
                                • _free.LIBCMT ref: 0044412B
                                • _free.LIBCMT ref: 0044413C
                                • _free.LIBCMT ref: 0044414D
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                APIs
                                • _strpbrk.LIBCMT ref: 0044E7B8
                                • _free.LIBCMT ref: 0044E8D5
                                  • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                  • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                                  • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                • String ID: *?$.
                                • API String ID: 2812119850-3972193922
                                • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                APIs
                                • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                  • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                  • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFileKeyboardLayoutNameconnectsend
                                • String ID: XQG$NG$PG
                                • API String ID: 1634807452-3565412412
                                • Opcode ID: ff509887c0297cf051371caae340bc63612711fcf8e22fa12d419fcf8622d445
                                • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                • Opcode Fuzzy Hash: ff509887c0297cf051371caae340bc63612711fcf8e22fa12d419fcf8622d445
                                • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                  • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                  • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                  • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                  • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                • String ID: /sort "Visit Time" /stext "$0NG
                                • API String ID: 368326130-3219657780
                                • Opcode ID: 19a75f4089cd682c196d93085774e8610958794b4b53e2c59ee42357a682b9a9
                                • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                • Opcode Fuzzy Hash: 19a75f4089cd682c196d93085774e8610958794b4b53e2c59ee42357a682b9a9
                                • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                APIs
                                  • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Init_thread_footer__onexit
                                • String ID: [End of clipboard]$[Text copied to clipboard]$xdF
                                • API String ID: 1881088180-1310280921
                                • Opcode ID: 817b4c01eafabb62cefe08f25f435df96e29b2123a05dda1d2c5d8970e98f987
                                • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                • Opcode Fuzzy Hash: 817b4c01eafabb62cefe08f25f435df96e29b2123a05dda1d2c5d8970e98f987
                                • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                APIs
                                • _wcslen.LIBCMT ref: 00416330
                                  • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                  • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                  • Part of subcall function 004138B2: RegCloseKey.KERNEL32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                  • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _wcslen$CloseCreateValue
                                • String ID: !D@$okmode$PG
                                • API String ID: 3411444782-3370592832
                                • Opcode ID: 32b767abda9d74a658984582e830535edcfbd4fa180c3dcb91f0b96cbdeabe52
                                • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                • Opcode Fuzzy Hash: 32b767abda9d74a658984582e830535edcfbd4fa180c3dcb91f0b96cbdeabe52
                                • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                APIs
                                  • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                Strings
                                • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                • API String ID: 1174141254-1980882731
                                • Opcode ID: 2a38480921e4d6be1d5b2529be3b715cdf247bf3a0a1df31f1585b54042120b5
                                • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                • Opcode Fuzzy Hash: 2a38480921e4d6be1d5b2529be3b715cdf247bf3a0a1df31f1585b54042120b5
                                • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                APIs
                                  • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                Strings
                                • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                • API String ID: 1174141254-1980882731
                                • Opcode ID: 48aa145b66dc80a11566b4620fdd9ce13eae5fb2ee34664654c02424daf75182
                                • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                • Opcode Fuzzy Hash: 48aa145b66dc80a11566b4620fdd9ce13eae5fb2ee34664654c02424daf75182
                                • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                APIs
                                • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                • wsprintfW.USER32 ref: 0040B22E
                                  • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: EventLocalTimewsprintf
                                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                • API String ID: 1497725170-1359877963
                                • Opcode ID: 3915eab654d502a94c5a300c40617f2f32f6303039d7969e722e20a12c8e19e4
                                • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                • Opcode Fuzzy Hash: 3915eab654d502a94c5a300c40617f2f32f6303039d7969e722e20a12c8e19e4
                                • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                APIs
                                  • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                  • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                                • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$LocalTime$wsprintf
                                • String ID: Online Keylogger Started
                                • API String ID: 112202259-1258561607
                                • Opcode ID: 0fcd38e96aacb40c04b118771990cdae8bba74e61c9056a984dbcae37755a7c2
                                • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                • Opcode Fuzzy Hash: 0fcd38e96aacb40c04b118771990cdae8bba74e61c9056a984dbcae37755a7c2
                                • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                APIs
                                • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: CryptUnprotectData$crypt32
                                • API String ID: 2574300362-2380590389
                                • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                • CloseHandle.KERNEL32(?), ref: 004051CA
                                • SetEvent.KERNEL32(?), ref: 004051D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEventHandleObjectSingleWait
                                • String ID: Connection Timeout
                                • API String ID: 2055531096-499159329
                                • Opcode ID: cfa6aba80e3ab73a333b17ef678a4c224e2718187884c1035a1560e2fee3ab95
                                • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                • Opcode Fuzzy Hash: cfa6aba80e3ab73a333b17ef678a4c224e2718187884c1035a1560e2fee3ab95
                                • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                APIs
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Exception@8Throw
                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                • API String ID: 2005118841-1866435925
                                • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                APIs
                                • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041385A
                                • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F85E,pth_unenc,004752D8), ref: 00413888
                                • RegCloseKey.ADVAPI32(004752D8,?,0040F85E,pth_unenc,004752D8), ref: 00413893
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateValue
                                • String ID: pth_unenc
                                • API String ID: 1818849710-4028850238
                                • Opcode ID: d69e82d7a202b39eabff8c6d6945ecb801863ff8e3666436e459375cd1f846cd
                                • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                • Opcode Fuzzy Hash: d69e82d7a202b39eabff8c6d6945ecb801863ff8e3666436e459375cd1f846cd
                                • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                APIs
                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                  • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                  • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                • String ID: bad locale name
                                • API String ID: 3628047217-1405518554
                                • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                APIs
                                • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                • ShowWindow.USER32(00000009), ref: 00416C9C
                                • SetForegroundWindow.USER32 ref: 00416CA8
                                  • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                  • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                  • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                  • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                • String ID: !D@
                                • API String ID: 186401046-604454484
                                • Opcode ID: dddbeebbe8cb821cdc8b1c7d2847af7eb141aaddcd72dd608c7fa4ca11ce81ef
                                • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                • Opcode Fuzzy Hash: dddbeebbe8cb821cdc8b1c7d2847af7eb141aaddcd72dd608c7fa4ca11ce81ef
                                • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteShell
                                • String ID: /C $cmd.exe$open
                                • API String ID: 587946157-3896048727
                                • Opcode ID: 16ef31fdaf301ba362d07f058173c5de43aaddf50e1ff7222e4b3bcda840a0cd
                                • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                • Opcode Fuzzy Hash: 16ef31fdaf301ba362d07f058173c5de43aaddf50e1ff7222e4b3bcda840a0cd
                                • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                APIs
                                • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                                • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteDirectoryFileRemove
                                • String ID: pth_unenc$xdF
                                • API String ID: 3325800564-2448381268
                                • Opcode ID: d40ba35bdc574994431a00040681681ffd5cebc2bb5ef4fca25f9a910d4daf75
                                • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                • Opcode Fuzzy Hash: d40ba35bdc574994431a00040681681ffd5cebc2bb5ef4fca25f9a910d4daf75
                                • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                APIs
                                • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: TerminateThread$HookUnhookWindows
                                • String ID: pth_unenc
                                • API String ID: 3123878439-4028850238
                                • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                                • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: __alldvrm$_strrchr
                                • String ID:
                                • API String ID: 1036877536-0
                                • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                APIs
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00404DDB
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                • String ID:
                                • API String ID: 3360349984-0
                                • Opcode ID: 9e0a8eaf4219b775e830663fcb54a959b6233ae16d1ef5de7dcca6256e783451
                                • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                • Opcode Fuzzy Hash: 9e0a8eaf4219b775e830663fcb54a959b6233ae16d1ef5de7dcca6256e783451
                                • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                APIs
                                Strings
                                • Cleared browsers logins and cookies., xrefs: 0040C130
                                • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep
                                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                • API String ID: 3472027048-1236744412
                                • Opcode ID: 1d84a610968c0f989614364af8c032c8251bfa68e213ae620782c32fadd9a619
                                • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                • Opcode Fuzzy Hash: 1d84a610968c0f989614364af8c032c8251bfa68e213ae620782c32fadd9a619
                                • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                APIs
                                  • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                  • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                  • Part of subcall function 00413733: RegCloseKey.ADVAPI32(00000000), ref: 00413773
                                • Sleep.KERNEL32(00000BB8), ref: 004127B5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQuerySleepValue
                                • String ID: 8SG$exepath$xdF
                                • API String ID: 4119054056-3578471011
                                • Opcode ID: 01bdf780ec6ac7598780d4fc060e49cfbed0a76d2458a37ef2a8bb80d49c98e5
                                • Instruction ID: 51bf296395b05d3efeb7b41814c334b1d8e13e95dfba71b8de44539041ec8c28
                                • Opcode Fuzzy Hash: 01bdf780ec6ac7598780d4fc060e49cfbed0a76d2458a37ef2a8bb80d49c98e5
                                • Instruction Fuzzy Hash: 3521F4A1B003042BD604B6365D4AAAF724D8B80318F40897FBA56E72D3DFBC9D45826D
                                APIs
                                  • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                  • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                  • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                • Sleep.KERNEL32(00000064), ref: 0040A638
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$SleepText$ForegroundLength
                                • String ID: [ $ ]
                                • API String ID: 3309952895-93608704
                                • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: SystemTimes$Sleep__aulldiv
                                • String ID:
                                • API String ID: 188215759-0
                                • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                                • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                APIs
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryLoad$ErrorLast
                                • String ID:
                                • API String ID: 3177248105-0
                                • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C568
                                • CloseHandle.KERNEL32(00000000), ref: 0041C576
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleReadSize
                                • String ID:
                                • API String ID: 3919263394-0
                                • Opcode ID: ea631e93aeae4d86132659a3c821e70bd950fb822780c369254ddbb306c6d1ec
                                • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                • Opcode Fuzzy Hash: ea631e93aeae4d86132659a3c821e70bd950fb822780c369254ddbb306c6d1ec
                                • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                APIs
                                • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                  • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                • _UnwindNestedFrames.LIBCMT ref: 00439911
                                • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                • String ID:
                                • API String ID: 2633735394-0
                                • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                APIs
                                • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: MetricsSystem
                                • String ID:
                                • API String ID: 4116985748-0
                                • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                APIs
                                • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                  • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                • String ID:
                                • API String ID: 1761009282-0
                                • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                APIs
                                • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorHandling__start
                                • String ID: pow
                                • API String ID: 3213639722-2276729525
                                • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                APIs
                                • GdiplusStartup.GDIPLUS(00474ACC,?,00000000,00000000), ref: 004187FA
                                  • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: GdiplusStartupconnectsend
                                • String ID: ,aF$NG
                                • API String ID: 1957403310-2168067942
                                • Opcode ID: 58f85970f1ba036b998a940dbcf5695eb429ab9dbe0addeb4128eb85be2fdd28
                                • Instruction ID: 646e85ae029ebb21aec6d49858a727e037fa7bb3a6359959f193cd142bf324ca
                                • Opcode Fuzzy Hash: 58f85970f1ba036b998a940dbcf5695eb429ab9dbe0addeb4128eb85be2fdd28
                                • Instruction Fuzzy Hash: 8E41D4713042015BC208FB22D892ABF7396ABC0358F50493FF54A672D2EF7C5D4A869E
                                APIs
                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418AF9
                                  • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                  • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                  • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                • String ID: image/jpeg
                                • API String ID: 1291196975-3785015651
                                • Opcode ID: 1a6cd23bb326207906ee55eab088e22a045b333238033622bcf03b289c973c7d
                                • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                                • Opcode Fuzzy Hash: 1a6cd23bb326207906ee55eab088e22a045b333238033622bcf03b289c973c7d
                                • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                                APIs
                                • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ACP$OCP
                                • API String ID: 0-711371036
                                • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                APIs
                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BE5
                                  • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418C0A
                                  • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                  • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                • String ID: image/png
                                • API String ID: 1291196975-2966254431
                                • Opcode ID: c053decb124affeca1ca8e7c910363171ca68cdd065e9a4048a61e85df625b55
                                • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                                • Opcode Fuzzy Hash: c053decb124affeca1ca8e7c910363171ca68cdd065e9a4048a61e85df625b55
                                • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                                APIs
                                • GetStdHandle.KERNEL32(000000F6), ref: 00449CBC
                                • GetFileType.KERNEL32(00000000), ref: 00449CCE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileHandleType
                                • String ID: @Z]
                                • API String ID: 3000768030-3663055941
                                • Opcode ID: b34b3b4b83b21344277d15047b5fba51ecc245e821c78927fd7bd009bf1ff183
                                • Instruction ID: 0971e15b3ed75ae4f19990cc7af9cd82d4526e04a272429d5fd5d939a02a2197
                                • Opcode Fuzzy Hash: b34b3b4b83b21344277d15047b5fba51ecc245e821c78927fd7bd009bf1ff183
                                • Instruction Fuzzy Hash: EF11907250475246E7308F3E9CC8223BAD5AB52331B38072BD5B7966F1C328DC82F249
                                APIs
                                • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                Strings
                                • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime
                                • String ID: KeepAlive | Enabled | Timeout:
                                • API String ID: 481472006-1507639952
                                • Opcode ID: 88bc6abef2036a94c41ea4afde5572064ad21bcafcbd622e37c2bb368cee5363
                                • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                • Opcode Fuzzy Hash: 88bc6abef2036a94c41ea4afde5572064ad21bcafcbd622e37c2bb368cee5363
                                • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: @Z]
                                • API String ID: 269201875-3663055941
                                • Opcode ID: a20b441ddeb67c9ee691f7cf4a146dca50fcbe4cc28fbe4176985be8152cb82c
                                • Instruction ID: 50f29c45267cc5de65db45c76c11a9fc4df43ae0f191c64cb21c29ff245d41fa
                                • Opcode Fuzzy Hash: a20b441ddeb67c9ee691f7cf4a146dca50fcbe4cc28fbe4176985be8152cb82c
                                • Instruction Fuzzy Hash: 9011D371A002004AEF309F39AC81B563294A714734F15172BF929EA3D6D3BCD8825F89
                                APIs
                                • Sleep.KERNEL32 ref: 0041667B
                                • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DownloadFileSleep
                                • String ID: !D@
                                • API String ID: 1931167962-604454484
                                • Opcode ID: 05864501e3066f261fa3773e90e58814017deb9033068c5665e3f6f63e0eedc9
                                • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                • Opcode Fuzzy Hash: 05864501e3066f261fa3773e90e58814017deb9033068c5665e3f6f63e0eedc9
                                • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                APIs
                                • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime
                                • String ID: | $%02i:%02i:%02i:%03i
                                • API String ID: 481472006-2430845779
                                • Opcode ID: 52f1b42f153ed4b644b91f11fc4c23a59010ae0a013f6087acbd7f2f1f111652
                                • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                • Opcode Fuzzy Hash: 52f1b42f153ed4b644b91f11fc4c23a59010ae0a013f6087acbd7f2f1f111652
                                • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: alarm.wav$hYG
                                • API String ID: 1174141254-2782910960
                                • Opcode ID: f7e91bfaf8b99ac86c10a1af32db07f645763c2e3290c42acfcbd5bd632e7d00
                                • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                • Opcode Fuzzy Hash: f7e91bfaf8b99ac86c10a1af32db07f645763c2e3290c42acfcbd5bd632e7d00
                                • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                APIs
                                  • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                  • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                • UnhookWindowsHookEx.USER32 ref: 0040B102
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                • String ID: Online Keylogger Stopped
                                • API String ID: 1623830855-1496645233
                                • Opcode ID: 539f72ab5f86f5c342155b2b16da774537cba30e5d1a0a8ca2b311f7dcb13205
                                • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                • Opcode Fuzzy Hash: 539f72ab5f86f5c342155b2b16da774537cba30e5d1a0a8ca2b311f7dcb13205
                                • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                APIs
                                  • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                • DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046EB40,00000010,0043C225), ref: 00449B3E
                                • _free.LIBCMT ref: 00449B4C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$DeleteEnter_free
                                • String ID: @Z]
                                • API String ID: 1836352639-3663055941
                                • Opcode ID: c4858f147dca3af98ff3072a35a331021ffe480fa2ea49ad75237c67703f4d69
                                • Instruction ID: 49f98359192604db3700e7d46e2ee0879056decf89b11c46129577f8840becb7
                                • Opcode Fuzzy Hash: c4858f147dca3af98ff3072a35a331021ffe480fa2ea49ad75237c67703f4d69
                                • Instruction Fuzzy Hash: C3115E31500214DFEB20DFA8E846B5D73B0FB04724F10455AE8599B2E6CBBCEC429B0D
                                APIs
                                • waveInPrepareHeader.WINMM(005CFBF0,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                • waveInAddBuffer.WINMM(005CFBF0,00000020,?,00000000,00401A15), ref: 0040185F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: wave$BufferHeaderPrepare
                                • String ID: XMG
                                • API String ID: 2315374483-813777761
                                • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: $G
                                • API String ID: 269201875-4251033865
                                • Opcode ID: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                • Instruction ID: 4a6f060c21597e0392f33703011e6e0157da39883ddad7ec559e06d861eb6f1f
                                • Opcode Fuzzy Hash: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                • Instruction Fuzzy Hash: 64E0E532A0152014F6713A3B6D1665B45C68BC1B3AF22423FF425962C2DFAC8946516E
                                APIs
                                • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocaleValid
                                • String ID: IsValidLocaleName$kKD
                                • API String ID: 1901932003-3269126172
                                • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                • API String ID: 1174141254-4188645398
                                • Opcode ID: 67a37633ad4a3934eb7a9710067efd7b2c9a9b469ed032209e18e61634ff2717
                                • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                • Opcode Fuzzy Hash: 67a37633ad4a3934eb7a9710067efd7b2c9a9b469ed032209e18e61634ff2717
                                • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                • API String ID: 1174141254-2800177040
                                • Opcode ID: 7414731bf553168197ebf71208b97339720711320eac3921dee6b082f9eb1638
                                • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                • Opcode Fuzzy Hash: 7414731bf553168197ebf71208b97339720711320eac3921dee6b082f9eb1638
                                • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                APIs
                                • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExistsFilePath
                                • String ID: AppData$\Opera Software\Opera Stable\
                                • API String ID: 1174141254-1629609700
                                • Opcode ID: 8000172e7e681251177a335894fd2e2a37e3823944c94c6a399ddcaad00f7658
                                • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                • Opcode Fuzzy Hash: 8000172e7e681251177a335894fd2e2a37e3823944c94c6a399ddcaad00f7658
                                • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free
                                • String ID: $G
                                • API String ID: 269201875-4251033865
                                • Opcode ID: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                                • Instruction ID: 5d396c1abc39b18bdc3e623667384c8b5cce6391ee106473ff554fc58991571d
                                • Opcode Fuzzy Hash: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                                • Instruction Fuzzy Hash: 7CE0E532A0652041F675763B2D05A5B47C55FC2B3AF22033BF028861C1DFEC494A606E
                                APIs
                                • GetKeyState.USER32(00000011), ref: 0040B686
                                  • Part of subcall function 0040A41B: GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                                  • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                  • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                  • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                  • Part of subcall function 0040A41B: GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                                  • Part of subcall function 0040A41B: ToUnicodeEx.USER32(00475144,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                                  • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                  • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                • String ID: [AltL]$[AltR]
                                • API String ID: 2738857842-2658077756
                                • Opcode ID: 0f70a0069a612ae1fb5ede6b6ff70f96726a9fd1eec0d97551c5347f5f324e5e
                                • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                • Opcode Fuzzy Hash: 0f70a0069a612ae1fb5ede6b6ff70f96726a9fd1eec0d97551c5347f5f324e5e
                                • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                APIs
                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteShell
                                • String ID: !D@$open
                                • API String ID: 587946157-1586967515
                                • Opcode ID: eb4567e96d42521689c96e83ef1aa2a6a7df05ac31277aa5078135f6cb8d6bca
                                • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                • Opcode Fuzzy Hash: eb4567e96d42521689c96e83ef1aa2a6a7df05ac31277aa5078135f6cb8d6bca
                                • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                APIs
                                • GetKeyState.USER32(00000012), ref: 0040B6E0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: State
                                • String ID: [CtrlL]$[CtrlR]
                                • API String ID: 1649606143-2446555240
                                • Opcode ID: 1d2d80fd5b8c20147d0c6ff4d402c2e3edc42c22dff79285f987829e6048126c
                                • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                • Opcode Fuzzy Hash: 1d2d80fd5b8c20147d0c6ff4d402c2e3edc42c22dff79285f987829e6048126c
                                • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                APIs
                                  • Part of subcall function 00449ADC: DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046EB40,00000010,0043C225), ref: 00449B3E
                                  • Part of subcall function 00449ADC: _free.LIBCMT ref: 00449B4C
                                  • Part of subcall function 00449B7C: _free.LIBCMT ref: 00449B9E
                                • DeleteCriticalSection.KERNEL32(005D5A20), ref: 0043C241
                                • _free.LIBCMT ref: 0043C255
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: _free$CriticalDeleteSection
                                • String ID: @Z]
                                • API String ID: 1906768660-3663055941
                                • Opcode ID: 63eb8731bacd2bc92b6a517d3705648d3868340f9125810a73be92756070acfe
                                • Instruction ID: 53b3c8965ed62865b06495ab0c988fe80dbb580c75aaeb32feec7d00177b517a
                                • Opcode Fuzzy Hash: 63eb8731bacd2bc92b6a517d3705648d3868340f9125810a73be92756070acfe
                                • Instruction Fuzzy Hash: F8E04F328145208FEB71BB69FD4595A73E4EB4D325B12086FF80DA3165CAADAC809B4D
                                APIs
                                  • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                • __Init_thread_footer.LIBCMT ref: 00410F64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: Init_thread_footer__onexit
                                • String ID: ,kG$0kG
                                • API String ID: 1881088180-2015055088
                                • Opcode ID: bf6eaf7ad603c651630b5b847c32adb66bdf614d62153d48efbad85f1494e607
                                • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                • Opcode Fuzzy Hash: bf6eaf7ad603c651630b5b847c32adb66bdf614d62153d48efbad85f1494e607
                                • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                APIs
                                • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D17F,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A6C
                                • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A80
                                Strings
                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteOpenValue
                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                • API String ID: 2654517830-1051519024
                                • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                APIs
                                • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ObjectProcessSingleTerminateWait
                                • String ID: pth_unenc
                                • API String ID: 1872346434-4028850238
                                • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                                • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: CommandLine
                                • String ID: 8([
                                • API String ID: 3253501508-1960659948
                                • Opcode ID: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                • Instruction ID: 694146ce0b361bd31d1980ce40e18c0a636997d79f12e70286e675221abc8fda
                                • Opcode Fuzzy Hash: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                • Instruction Fuzzy Hash: CBB04878800753CB97108F21AA0C0853FA0B30820238020B6940A92A21EB7885868A08
                                APIs
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                • GetLastError.KERNEL32 ref: 00440D85
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorLast
                                • String ID:
                                • API String ID: 1717984340-0
                                • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                APIs
                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                                • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                Memory Dump Source
                                • Source File: 00000000.00000002.4723294504.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.4723273775.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723346753.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723375654.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.4723419776.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_17323410673807b67d8bb6f66f1d676167634fbe15d4743d1d486ea52ce68855c1615c.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastRead
                                • String ID:
                                • API String ID: 4100373531-0
                                • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99